Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-11053 (GCVE-0-2024-11053)
Vulnerability from cvelistv5
| URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| curl | curl | Version: 8.11.0   ≤ 8.11.0 Version: 8.10.1 ≤ 8.10.1 Version: 8.10.0 ≤ 8.10.0 Version: 8.9.1 ≤ 8.9.1 Version: 8.9.0 ≤ 8.9.0 Version: 8.8.0 ≤ 8.8.0 Version: 8.7.1 ≤ 8.7.1 Version: 8.7.0 ≤ 8.7.0 Version: 8.6.0 ≤ 8.6.0 Version: 8.5.0 ≤ 8.5.0 Version: 8.4.0 ≤ 8.4.0 Version: 8.3.0 ≤ 8.3.0 Version: 8.2.1 ≤ 8.2.1 Version: 8.2.0 ≤ 8.2.0 Version: 8.1.2 ≤ 8.1.2 Version: 8.1.1 ≤ 8.1.1 Version: 8.1.0 ≤ 8.1.0 Version: 8.0.1 ≤ 8.0.1 Version: 8.0.0 ≤ 8.0.0 Version: 7.88.1 ≤ 7.88.1 Version: 7.88.0 ≤ 7.88.0 Version: 7.87.0 ≤ 7.87.0 Version: 7.86.0 ≤ 7.86.0 Version: 7.85.0 ≤ 7.85.0 Version: 7.84.0 ≤ 7.84.0 Version: 7.83.1 ≤ 7.83.1 Version: 7.83.0 ≤ 7.83.0 Version: 7.82.0 ≤ 7.82.0 Version: 7.81.0 ≤ 7.81.0 Version: 7.80.0 ≤ 7.80.0 Version: 7.79.1 ≤ 7.79.1 Version: 7.79.0 ≤ 7.79.0 Version: 7.78.0 ≤ 7.78.0 Version: 7.77.0 ≤ 7.77.0 Version: 7.76.1 ≤ 7.76.1 Version: 7.76.0 ≤ 7.76.0 Version: 7.75.0 ≤ 7.75.0 Version: 7.74.0 ≤ 7.74.0 Version: 7.73.0 ≤ 7.73.0 Version: 7.72.0 ≤ 7.72.0 Version: 7.71.1 ≤ 7.71.1 Version: 7.71.0 ≤ 7.71.0 Version: 7.70.0 ≤ 7.70.0 Version: 7.69.1 ≤ 7.69.1 Version: 7.69.0 ≤ 7.69.0 Version: 7.68.0 ≤ 7.68.0 Version: 7.67.0 ≤ 7.67.0 Version: 7.66.0 ≤ 7.66.0 Version: 7.65.3 ≤ 7.65.3 Version: 7.65.2 ≤ 7.65.2 Version: 7.65.1 ≤ 7.65.1 Version: 7.65.0 ≤ 7.65.0 Version: 7.64.1 ≤ 7.64.1 Version: 7.64.0 ≤ 7.64.0 Version: 7.63.0 ≤ 7.63.0 Version: 7.62.0 ≤ 7.62.0 Version: 7.61.1 ≤ 7.61.1 Version: 7.61.0 ≤ 7.61.0 Version: 7.60.0 ≤ 7.60.0 Version: 7.59.0 ≤ 7.59.0 Version: 7.58.0 ≤ 7.58.0 Version: 7.57.0 ≤ 7.57.0 Version: 7.56.1 ≤ 7.56.1 Version: 7.56.0 ≤ 7.56.0 Version: 7.55.1 ≤ 7.55.1 Version: 7.55.0 ≤ 7.55.0 Version: 7.54.1 ≤ 7.54.1 Version: 7.54.0 ≤ 7.54.0 Version: 7.53.1 ≤ 7.53.1 Version: 7.53.0 ≤ 7.53.0 Version: 7.52.1 ≤ 7.52.1 Version: 7.52.0 ≤ 7.52.0 Version: 7.51.0 ≤ 7.51.0 Version: 7.50.3 ≤ 7.50.3 Version: 7.50.2 ≤ 7.50.2 Version: 7.50.1 ≤ 7.50.1 Version: 7.50.0 ≤ 7.50.0 Version: 7.49.1 ≤ 7.49.1 Version: 7.49.0 ≤ 7.49.0 Version: 7.48.0 ≤ 7.48.0 Version: 7.47.1 ≤ 7.47.1 Version: 7.47.0 ≤ 7.47.0 Version: 7.46.0 ≤ 7.46.0 Version: 7.45.0 ≤ 7.45.0 Version: 7.44.0 ≤ 7.44.0 Version: 7.43.0 ≤ 7.43.0 Version: 7.42.1 ≤ 7.42.1 Version: 7.42.0 ≤ 7.42.0 Version: 7.41.0 ≤ 7.41.0 Version: 7.40.0 ≤ 7.40.0 Version: 7.39.0 ≤ 7.39.0 Version: 7.38.0 ≤ 7.38.0 Version: 7.37.1 ≤ 7.37.1 Version: 7.37.0 ≤ 7.37.0 Version: 7.36.0 ≤ 7.36.0 Version: 7.35.0 ≤ 7.35.0 Version: 7.34.0 ≤ 7.34.0 Version: 7.33.0 ≤ 7.33.0 Version: 7.32.0 ≤ 7.32.0 Version: 7.31.0 ≤ 7.31.0 Version: 7.30.0 ≤ 7.30.0 Version: 7.29.0 ≤ 7.29.0 Version: 7.28.1 ≤ 7.28.1 Version: 7.28.0 ≤ 7.28.0 Version: 7.27.0 ≤ 7.27.0 Version: 7.26.0 ≤ 7.26.0 Version: 7.25.0 ≤ 7.25.0 Version: 7.24.0 ≤ 7.24.0 Version: 7.23.1 ≤ 7.23.1 Version: 7.23.0 ≤ 7.23.0 Version: 7.22.0 ≤ 7.22.0 Version: 7.21.7 ≤ 7.21.7 Version: 7.21.6 ≤ 7.21.6 Version: 7.21.5 ≤ 7.21.5 Version: 7.21.4 ≤ 7.21.4 Version: 7.21.3 ≤ 7.21.3 Version: 7.21.2 ≤ 7.21.2 Version: 7.21.1 ≤ 7.21.1 Version: 7.21.0 ≤ 7.21.0 Version: 7.20.1 ≤ 7.20.1 Version: 7.20.0 ≤ 7.20.0 Version: 7.19.7 ≤ 7.19.7 Version: 7.19.6 ≤ 7.19.6 Version: 7.19.5 ≤ 7.19.5 Version: 7.19.4 ≤ 7.19.4 Version: 7.19.3 ≤ 7.19.3 Version: 7.19.2 ≤ 7.19.2 Version: 7.19.1 ≤ 7.19.1 Version: 7.19.0 ≤ 7.19.0 Version: 7.18.2 ≤ 7.18.2 Version: 7.18.1 ≤ 7.18.1 Version: 7.18.0 ≤ 7.18.0 Version: 7.17.1 ≤ 7.17.1 Version: 7.17.0 ≤ 7.17.0 Version: 7.16.4 ≤ 7.16.4 Version: 7.16.3 ≤ 7.16.3 Version: 7.16.2 ≤ 7.16.2 Version: 7.16.1 ≤ 7.16.1 Version: 7.16.0 ≤ 7.16.0 Version: 7.15.5 ≤ 7.15.5 Version: 7.15.4 ≤ 7.15.4 Version: 7.15.3 ≤ 7.15.3 Version: 7.15.2 ≤ 7.15.2 Version: 7.15.1 ≤ 7.15.1 Version: 7.15.0 ≤ 7.15.0 Version: 7.14.1 ≤ 7.14.1 Version: 7.14.0 ≤ 7.14.0 Version: 7.13.2 ≤ 7.13.2 Version: 7.13.1 ≤ 7.13.1 Version: 7.13.0 ≤ 7.13.0 Version: 7.12.3 ≤ 7.12.3 Version: 7.12.2 ≤ 7.12.2 Version: 7.12.1 ≤ 7.12.1 Version: 7.12.0 ≤ 7.12.0 Version: 7.11.2 ≤ 7.11.2 Version: 7.11.1 ≤ 7.11.1 Version: 7.11.0 ≤ 7.11.0 Version: 7.10.8 ≤ 7.10.8 Version: 7.10.7 ≤ 7.10.7 Version: 7.10.6 ≤ 7.10.6 Version: 7.10.5 ≤ 7.10.5 Version: 7.10.4 ≤ 7.10.4 Version: 7.10.3 ≤ 7.10.3 Version: 7.10.2 ≤ 7.10.2 Version: 7.10.1 ≤ 7.10.1 Version: 7.10 ≤ 7.10 Version: 7.9.8 ≤ 7.9.8 Version: 7.9.7 ≤ 7.9.7 Version: 7.9.6 ≤ 7.9.6 Version: 7.9.5 ≤ 7.9.5 Version: 7.9.4 ≤ 7.9.4 Version: 7.9.3 ≤ 7.9.3 Version: 7.9.2 ≤ 7.9.2 Version: 7.9.1 ≤ 7.9.1 Version: 7.9 ≤ 7.9 Version: 7.8.1 ≤ 7.8.1 Version: 7.8 ≤ 7.8 Version: 7.7.3 ≤ 7.7.3 Version: 7.7.2 ≤ 7.7.2 Version: 7.7.1 ≤ 7.7.1 Version: 7.7 ≤ 7.7 Version: 7.6.1 ≤ 7.6.1 Version: 7.6 ≤ 7.6 Version: 7.5.2 ≤ 7.5.2 Version: 7.5.1 ≤ 7.5.1 Version: 7.5 ≤ 7.5 Version: 7.4.2 ≤ 7.4.2 Version: 7.4.1 ≤ 7.4.1 Version: 7.4 ≤ 7.4 Version: 7.3 ≤ 7.3 Version: 7.2.1 ≤ 7.2.1 Version: 7.2 ≤ 7.2 Version: 7.1.1 ≤ 7.1.1 Version: 7.1 ≤ 7.1 Version: 6.5.2 ≤ 6.5.2 Version: 6.5.1 ≤ 6.5.1 Version: 6.5 ≤ 6.5 | 
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2025-01-31T15:02:42.742Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2024/12/11/1"
          },
          {
            "url": "https://security.netapp.com/advisory/ntap-20250124-0012/"
          },
          {
            "url": "https://security.netapp.com/advisory/ntap-20250131-0003/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 3.4,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-11053",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-15T16:47:42.738403Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-15T16:50:59.398Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "curl",
          "vendor": "curl",
          "versions": [
            {
              "lessThanOrEqual": "8.11.0",
              "status": "affected",
              "version": "8.11.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.1",
              "status": "affected",
              "version": "8.10.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.10.0",
              "status": "affected",
              "version": "8.10.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.9.1",
              "status": "affected",
              "version": "8.9.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.9.0",
              "status": "affected",
              "version": "8.9.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.8.0",
              "status": "affected",
              "version": "8.8.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.7.1",
              "status": "affected",
              "version": "8.7.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.7.0",
              "status": "affected",
              "version": "8.7.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.6.0",
              "status": "affected",
              "version": "8.6.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.5.0",
              "status": "affected",
              "version": "8.5.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.4.0",
              "status": "affected",
              "version": "8.4.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.3.0",
              "status": "affected",
              "version": "8.3.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.2.1",
              "status": "affected",
              "version": "8.2.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.2.0",
              "status": "affected",
              "version": "8.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.1.2",
              "status": "affected",
              "version": "8.1.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.1.1",
              "status": "affected",
              "version": "8.1.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.1.0",
              "status": "affected",
              "version": "8.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.0.1",
              "status": "affected",
              "version": "8.0.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "8.0.0",
              "status": "affected",
              "version": "8.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.88.1",
              "status": "affected",
              "version": "7.88.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.88.0",
              "status": "affected",
              "version": "7.88.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.87.0",
              "status": "affected",
              "version": "7.87.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.86.0",
              "status": "affected",
              "version": "7.86.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.85.0",
              "status": "affected",
              "version": "7.85.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.84.0",
              "status": "affected",
              "version": "7.84.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.83.1",
              "status": "affected",
              "version": "7.83.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.83.0",
              "status": "affected",
              "version": "7.83.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.82.0",
              "status": "affected",
              "version": "7.82.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.81.0",
              "status": "affected",
              "version": "7.81.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.80.0",
              "status": "affected",
              "version": "7.80.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.79.1",
              "status": "affected",
              "version": "7.79.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.79.0",
              "status": "affected",
              "version": "7.79.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.78.0",
              "status": "affected",
              "version": "7.78.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.77.0",
              "status": "affected",
              "version": "7.77.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.76.1",
              "status": "affected",
              "version": "7.76.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.76.0",
              "status": "affected",
              "version": "7.76.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.75.0",
              "status": "affected",
              "version": "7.75.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.74.0",
              "status": "affected",
              "version": "7.74.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.73.0",
              "status": "affected",
              "version": "7.73.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.72.0",
              "status": "affected",
              "version": "7.72.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.71.1",
              "status": "affected",
              "version": "7.71.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.71.0",
              "status": "affected",
              "version": "7.71.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.70.0",
              "status": "affected",
              "version": "7.70.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.69.1",
              "status": "affected",
              "version": "7.69.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.69.0",
              "status": "affected",
              "version": "7.69.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.68.0",
              "status": "affected",
              "version": "7.68.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.67.0",
              "status": "affected",
              "version": "7.67.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.66.0",
              "status": "affected",
              "version": "7.66.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.65.3",
              "status": "affected",
              "version": "7.65.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.65.2",
              "status": "affected",
              "version": "7.65.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.65.1",
              "status": "affected",
              "version": "7.65.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.65.0",
              "status": "affected",
              "version": "7.65.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.64.1",
              "status": "affected",
              "version": "7.64.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.64.0",
              "status": "affected",
              "version": "7.64.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.63.0",
              "status": "affected",
              "version": "7.63.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.62.0",
              "status": "affected",
              "version": "7.62.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.61.1",
              "status": "affected",
              "version": "7.61.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.61.0",
              "status": "affected",
              "version": "7.61.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.60.0",
              "status": "affected",
              "version": "7.60.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.59.0",
              "status": "affected",
              "version": "7.59.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.58.0",
              "status": "affected",
              "version": "7.58.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.57.0",
              "status": "affected",
              "version": "7.57.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.56.1",
              "status": "affected",
              "version": "7.56.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.56.0",
              "status": "affected",
              "version": "7.56.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.55.1",
              "status": "affected",
              "version": "7.55.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.55.0",
              "status": "affected",
              "version": "7.55.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.54.1",
              "status": "affected",
              "version": "7.54.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.54.0",
              "status": "affected",
              "version": "7.54.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.53.1",
              "status": "affected",
              "version": "7.53.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.53.0",
              "status": "affected",
              "version": "7.53.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.52.1",
              "status": "affected",
              "version": "7.52.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.52.0",
              "status": "affected",
              "version": "7.52.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.51.0",
              "status": "affected",
              "version": "7.51.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.50.3",
              "status": "affected",
              "version": "7.50.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.50.2",
              "status": "affected",
              "version": "7.50.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.50.1",
              "status": "affected",
              "version": "7.50.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.50.0",
              "status": "affected",
              "version": "7.50.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.49.1",
              "status": "affected",
              "version": "7.49.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.49.0",
              "status": "affected",
              "version": "7.49.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.48.0",
              "status": "affected",
              "version": "7.48.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.47.1",
              "status": "affected",
              "version": "7.47.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.47.0",
              "status": "affected",
              "version": "7.47.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.46.0",
              "status": "affected",
              "version": "7.46.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.45.0",
              "status": "affected",
              "version": "7.45.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.44.0",
              "status": "affected",
              "version": "7.44.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.43.0",
              "status": "affected",
              "version": "7.43.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.42.1",
              "status": "affected",
              "version": "7.42.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.42.0",
              "status": "affected",
              "version": "7.42.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.41.0",
              "status": "affected",
              "version": "7.41.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.40.0",
              "status": "affected",
              "version": "7.40.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.39.0",
              "status": "affected",
              "version": "7.39.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.38.0",
              "status": "affected",
              "version": "7.38.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.37.1",
              "status": "affected",
              "version": "7.37.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.37.0",
              "status": "affected",
              "version": "7.37.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.36.0",
              "status": "affected",
              "version": "7.36.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.35.0",
              "status": "affected",
              "version": "7.35.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.34.0",
              "status": "affected",
              "version": "7.34.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.33.0",
              "status": "affected",
              "version": "7.33.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.32.0",
              "status": "affected",
              "version": "7.32.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.31.0",
              "status": "affected",
              "version": "7.31.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.30.0",
              "status": "affected",
              "version": "7.30.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.29.0",
              "status": "affected",
              "version": "7.29.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.28.1",
              "status": "affected",
              "version": "7.28.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.28.0",
              "status": "affected",
              "version": "7.28.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.27.0",
              "status": "affected",
              "version": "7.27.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.26.0",
              "status": "affected",
              "version": "7.26.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.25.0",
              "status": "affected",
              "version": "7.25.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.24.0",
              "status": "affected",
              "version": "7.24.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.23.1",
              "status": "affected",
              "version": "7.23.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.23.0",
              "status": "affected",
              "version": "7.23.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.22.0",
              "status": "affected",
              "version": "7.22.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.7",
              "status": "affected",
              "version": "7.21.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.6",
              "status": "affected",
              "version": "7.21.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.5",
              "status": "affected",
              "version": "7.21.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.4",
              "status": "affected",
              "version": "7.21.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.3",
              "status": "affected",
              "version": "7.21.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.2",
              "status": "affected",
              "version": "7.21.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.1",
              "status": "affected",
              "version": "7.21.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.21.0",
              "status": "affected",
              "version": "7.21.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.20.1",
              "status": "affected",
              "version": "7.20.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.20.0",
              "status": "affected",
              "version": "7.20.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.7",
              "status": "affected",
              "version": "7.19.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.6",
              "status": "affected",
              "version": "7.19.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.5",
              "status": "affected",
              "version": "7.19.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.4",
              "status": "affected",
              "version": "7.19.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.3",
              "status": "affected",
              "version": "7.19.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.2",
              "status": "affected",
              "version": "7.19.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.1",
              "status": "affected",
              "version": "7.19.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.19.0",
              "status": "affected",
              "version": "7.19.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.18.2",
              "status": "affected",
              "version": "7.18.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.18.1",
              "status": "affected",
              "version": "7.18.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.18.0",
              "status": "affected",
              "version": "7.18.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.17.1",
              "status": "affected",
              "version": "7.17.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.17.0",
              "status": "affected",
              "version": "7.17.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.16.4",
              "status": "affected",
              "version": "7.16.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.16.3",
              "status": "affected",
              "version": "7.16.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.16.2",
              "status": "affected",
              "version": "7.16.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.16.1",
              "status": "affected",
              "version": "7.16.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.16.0",
              "status": "affected",
              "version": "7.16.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.5",
              "status": "affected",
              "version": "7.15.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.4",
              "status": "affected",
              "version": "7.15.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.3",
              "status": "affected",
              "version": "7.15.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.2",
              "status": "affected",
              "version": "7.15.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.1",
              "status": "affected",
              "version": "7.15.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.15.0",
              "status": "affected",
              "version": "7.15.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.14.1",
              "status": "affected",
              "version": "7.14.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.14.0",
              "status": "affected",
              "version": "7.14.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.13.2",
              "status": "affected",
              "version": "7.13.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.13.1",
              "status": "affected",
              "version": "7.13.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.13.0",
              "status": "affected",
              "version": "7.13.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.12.3",
              "status": "affected",
              "version": "7.12.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.12.2",
              "status": "affected",
              "version": "7.12.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.12.1",
              "status": "affected",
              "version": "7.12.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.12.0",
              "status": "affected",
              "version": "7.12.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.11.2",
              "status": "affected",
              "version": "7.11.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.11.1",
              "status": "affected",
              "version": "7.11.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.11.0",
              "status": "affected",
              "version": "7.11.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.8",
              "status": "affected",
              "version": "7.10.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.7",
              "status": "affected",
              "version": "7.10.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.6",
              "status": "affected",
              "version": "7.10.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.5",
              "status": "affected",
              "version": "7.10.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.4",
              "status": "affected",
              "version": "7.10.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.3",
              "status": "affected",
              "version": "7.10.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.2",
              "status": "affected",
              "version": "7.10.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10.1",
              "status": "affected",
              "version": "7.10.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.10",
              "status": "affected",
              "version": "7.10",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.8",
              "status": "affected",
              "version": "7.9.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.7",
              "status": "affected",
              "version": "7.9.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.6",
              "status": "affected",
              "version": "7.9.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.5",
              "status": "affected",
              "version": "7.9.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.4",
              "status": "affected",
              "version": "7.9.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.3",
              "status": "affected",
              "version": "7.9.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.2",
              "status": "affected",
              "version": "7.9.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9.1",
              "status": "affected",
              "version": "7.9.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.9",
              "status": "affected",
              "version": "7.9",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.8.1",
              "status": "affected",
              "version": "7.8.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.8",
              "status": "affected",
              "version": "7.8",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.7.3",
              "status": "affected",
              "version": "7.7.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.7.2",
              "status": "affected",
              "version": "7.7.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.7.1",
              "status": "affected",
              "version": "7.7.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.7",
              "status": "affected",
              "version": "7.7",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.6.1",
              "status": "affected",
              "version": "7.6.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.6",
              "status": "affected",
              "version": "7.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.5.2",
              "status": "affected",
              "version": "7.5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.5.1",
              "status": "affected",
              "version": "7.5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.5",
              "status": "affected",
              "version": "7.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.2",
              "status": "affected",
              "version": "7.4.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4.1",
              "status": "affected",
              "version": "7.4.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.4",
              "status": "affected",
              "version": "7.4",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.3",
              "status": "affected",
              "version": "7.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2.1",
              "status": "affected",
              "version": "7.2.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.2",
              "status": "affected",
              "version": "7.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.1.1",
              "status": "affected",
              "version": "7.1.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.1",
              "status": "affected",
              "version": "7.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.2",
              "status": "affected",
              "version": "6.5.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5.1",
              "status": "affected",
              "version": "6.5.1",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.5",
              "status": "affected",
              "version": "6.5",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Harry Sintonen"
        },
        {
          "lang": "en",
          "type": "remediation developer",
          "value": "Daniel Stenberg"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-11T07:34:29.539Z",
        "orgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
        "shortName": "curl"
      },
      "references": [
        {
          "name": "json",
          "url": "https://curl.se/docs/CVE-2024-11053.json"
        },
        {
          "name": "www",
          "url": "https://curl.se/docs/CVE-2024-11053.html"
        },
        {
          "name": "issue",
          "url": "https://hackerone.com/reports/2829063"
        }
      ],
      "title": "netrc and redirect credential leak"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2499f714-1537-4658-8207-48ae4bb9eae9",
    "assignerShortName": "curl",
    "cveId": "CVE-2024-11053",
    "datePublished": "2024-12-11T07:34:29.539Z",
    "dateReserved": "2024-11-09T18:41:55.703Z",
    "dateUpdated": "2025-01-31T15:02:42.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-11053\",\"sourceIdentifier\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"published\":\"2024-12-11T08:15:05.307\",\"lastModified\":\"2025-07-30T17:39:25.437\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When asked to both use a `.netrc` file for credentials and to follow HTTP\\nredirects, curl could leak the password used for the first host to the\\nfollowed-to host under certain circumstances.\\n\\nThis flaw only manifests itself if the netrc file has an entry that matches\\nthe redirect target hostname but the entry either omits just the password or\\nomits both login and password.\"},{\"lang\":\"es\",\"value\":\"Cuando se le pide que use un archivo `.netrc` para las credenciales y que siga las redirecciones HTTP, curl podr\u00eda filtrar la contrase\u00f1a utilizada para el primer host al host al que sigue en determinadas circunstancias. Esta falla solo se manifiesta si el archivo netrc tiene una entrada que coincide con el nombre de host de destino de la redirecci\u00f3n, pero la entrada omite solo la contrase\u00f1a u omite tanto el nombre de usuario como la contrase\u00f1a.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N\",\"baseScore\":3.4,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.76.0\",\"versionEndExcluding\":\"8.11.1\",\"matchCriteriaId\":\"F834FD12-881B-47A6-90B0-A440E61A9CE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20333EE-4C13-426E-8B54-D78679D5DDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89612649-BACF-4FAC-9BA4-324724FD93A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D9B255-C1AF-42D1-BF9B-13642FBDC080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7CFE0E-9D1E-4495-B302-89C3096FC0DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5921A877-18BF-43FE-915C-D226E140ACFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7296A1F2-D315-4FD5-8A73-65C480C855BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56409CEC-5A1E-4450-AA42-641E459CC2AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06F4839-D16A-4A61-9BB5-55B13F41E47F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7447BC-F315-4298-A822-549942FC118B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6770B6C3-732E-4E22-BF1C-2D2FD610061C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F9C8C20-42EB-4AB5-BD97-212DEB070C43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B4AD8A-F172-4558-AEC6-FF424BA2D912\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8497A4C9-8474-4A62-8331-3FE862ED4098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FFF7106-ED78-49BA-9EC5-B889E3685D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63D8B0F-006E-4801-BF9D-1C001BBFB4F9\"}]}]}],\"references\":[{\"url\":\"https://curl.se/docs/CVE-2024-11053.html\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://curl.se/docs/CVE-2024-11053.json\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://hackerone.com/reports/2829063\",\"source\":\"2499f714-1537-4658-8207-48ae4bb9eae9\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/12/11/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250124-0012/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250131-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/12/11/1\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250124-0012/\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250131-0003/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-31T15:02:42.742Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 3.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-11053\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-15T16:47:42.738403Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-11T15:00:16.326Z\"}}], \"cna\": {\"title\": \"netrc and redirect credential leak\", \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Harry Sintonen\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Daniel Stenberg\"}], \"affected\": [{\"vendor\": \"curl\", \"product\": \"curl\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.11.0\"}, {\"status\": \"affected\", \"version\": \"8.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.1\"}, {\"status\": \"affected\", \"version\": \"8.10.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.10.0\"}, {\"status\": \"affected\", \"version\": \"8.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.1\"}, {\"status\": \"affected\", \"version\": \"8.9.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.9.0\"}, {\"status\": \"affected\", \"version\": \"8.8.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.8.0\"}, {\"status\": \"affected\", \"version\": \"8.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.1\"}, {\"status\": \"affected\", \"version\": \"8.7.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.7.0\"}, {\"status\": \"affected\", \"version\": \"8.6.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.6.0\"}, {\"status\": \"affected\", \"version\": \"8.5.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.5.0\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"8.3.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.3.0\"}, {\"status\": \"affected\", \"version\": \"8.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.1\"}, {\"status\": \"affected\", \"version\": \"8.2.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.2.0\"}, {\"status\": \"affected\", \"version\": \"8.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.2\"}, {\"status\": \"affected\", \"version\": \"8.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.1\"}, {\"status\": \"affected\", \"version\": \"8.1.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.1.0\"}, {\"status\": \"affected\", \"version\": \"8.0.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.1\"}, {\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"8.0.0\"}, {\"status\": \"affected\", \"version\": \"7.88.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.1\"}, {\"status\": \"affected\", \"version\": \"7.88.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.88.0\"}, {\"status\": \"affected\", \"version\": \"7.87.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.87.0\"}, {\"status\": \"affected\", \"version\": \"7.86.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.86.0\"}, {\"status\": \"affected\", \"version\": \"7.85.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.85.0\"}, {\"status\": \"affected\", \"version\": \"7.84.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.84.0\"}, {\"status\": \"affected\", \"version\": \"7.83.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.1\"}, {\"status\": \"affected\", \"version\": \"7.83.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.83.0\"}, {\"status\": \"affected\", \"version\": \"7.82.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.82.0\"}, {\"status\": \"affected\", \"version\": \"7.81.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.81.0\"}, {\"status\": \"affected\", \"version\": \"7.80.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.80.0\"}, {\"status\": \"affected\", \"version\": \"7.79.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.1\"}, {\"status\": \"affected\", \"version\": \"7.79.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.79.0\"}, {\"status\": \"affected\", \"version\": \"7.78.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.78.0\"}, {\"status\": \"affected\", \"version\": \"7.77.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.77.0\"}, {\"status\": \"affected\", \"version\": \"7.76.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.1\"}, {\"status\": \"affected\", \"version\": \"7.76.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.76.0\"}, {\"status\": \"affected\", \"version\": \"7.75.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.75.0\"}, {\"status\": \"affected\", \"version\": \"7.74.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.74.0\"}, {\"status\": \"affected\", \"version\": \"7.73.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.73.0\"}, {\"status\": \"affected\", \"version\": \"7.72.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.72.0\"}, {\"status\": \"affected\", \"version\": \"7.71.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.1\"}, {\"status\": \"affected\", \"version\": \"7.71.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.71.0\"}, {\"status\": \"affected\", \"version\": \"7.70.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.70.0\"}, {\"status\": \"affected\", \"version\": \"7.69.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.1\"}, {\"status\": \"affected\", \"version\": \"7.69.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.69.0\"}, {\"status\": \"affected\", \"version\": \"7.68.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.68.0\"}, {\"status\": \"affected\", \"version\": \"7.67.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.67.0\"}, {\"status\": \"affected\", \"version\": \"7.66.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.66.0\"}, {\"status\": \"affected\", \"version\": \"7.65.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.3\"}, {\"status\": \"affected\", \"version\": \"7.65.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.2\"}, {\"status\": \"affected\", \"version\": \"7.65.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.1\"}, {\"status\": \"affected\", \"version\": \"7.65.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.65.0\"}, {\"status\": \"affected\", \"version\": \"7.64.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.1\"}, {\"status\": \"affected\", \"version\": \"7.64.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.64.0\"}, {\"status\": \"affected\", \"version\": \"7.63.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.63.0\"}, {\"status\": \"affected\", \"version\": \"7.62.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.62.0\"}, {\"status\": \"affected\", \"version\": \"7.61.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.1\"}, {\"status\": \"affected\", \"version\": \"7.61.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.61.0\"}, {\"status\": \"affected\", \"version\": \"7.60.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.60.0\"}, {\"status\": \"affected\", \"version\": \"7.59.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.59.0\"}, {\"status\": \"affected\", \"version\": \"7.58.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.58.0\"}, {\"status\": \"affected\", \"version\": \"7.57.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.57.0\"}, {\"status\": \"affected\", \"version\": \"7.56.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.1\"}, {\"status\": \"affected\", \"version\": \"7.56.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.56.0\"}, {\"status\": \"affected\", \"version\": \"7.55.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.1\"}, {\"status\": \"affected\", \"version\": \"7.55.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.55.0\"}, {\"status\": \"affected\", \"version\": \"7.54.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.1\"}, {\"status\": \"affected\", \"version\": \"7.54.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.54.0\"}, {\"status\": \"affected\", \"version\": \"7.53.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.1\"}, {\"status\": \"affected\", \"version\": \"7.53.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.53.0\"}, {\"status\": \"affected\", \"version\": \"7.52.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.1\"}, {\"status\": \"affected\", \"version\": \"7.52.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.52.0\"}, {\"status\": \"affected\", \"version\": \"7.51.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.51.0\"}, {\"status\": \"affected\", \"version\": \"7.50.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.3\"}, {\"status\": \"affected\", \"version\": \"7.50.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.2\"}, {\"status\": \"affected\", \"version\": \"7.50.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.1\"}, {\"status\": \"affected\", \"version\": \"7.50.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.50.0\"}, {\"status\": \"affected\", \"version\": \"7.49.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.1\"}, {\"status\": \"affected\", \"version\": \"7.49.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.49.0\"}, {\"status\": \"affected\", \"version\": \"7.48.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.48.0\"}, {\"status\": \"affected\", \"version\": \"7.47.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.1\"}, {\"status\": \"affected\", \"version\": \"7.47.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.47.0\"}, {\"status\": \"affected\", \"version\": \"7.46.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.46.0\"}, {\"status\": \"affected\", \"version\": \"7.45.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.45.0\"}, {\"status\": \"affected\", \"version\": \"7.44.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.44.0\"}, {\"status\": \"affected\", \"version\": \"7.43.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.43.0\"}, {\"status\": \"affected\", \"version\": \"7.42.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.1\"}, {\"status\": \"affected\", \"version\": \"7.42.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.42.0\"}, {\"status\": \"affected\", \"version\": \"7.41.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.41.0\"}, {\"status\": \"affected\", \"version\": \"7.40.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.40.0\"}, {\"status\": \"affected\", \"version\": \"7.39.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.39.0\"}, {\"status\": \"affected\", \"version\": \"7.38.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.38.0\"}, {\"status\": \"affected\", \"version\": \"7.37.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.1\"}, {\"status\": \"affected\", \"version\": \"7.37.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.37.0\"}, {\"status\": \"affected\", \"version\": \"7.36.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.36.0\"}, {\"status\": \"affected\", \"version\": \"7.35.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.35.0\"}, {\"status\": \"affected\", \"version\": \"7.34.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.34.0\"}, {\"status\": \"affected\", \"version\": \"7.33.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.33.0\"}, {\"status\": \"affected\", \"version\": \"7.32.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.32.0\"}, {\"status\": \"affected\", \"version\": \"7.31.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.31.0\"}, {\"status\": \"affected\", \"version\": \"7.30.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.30.0\"}, {\"status\": \"affected\", \"version\": \"7.29.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.29.0\"}, {\"status\": \"affected\", \"version\": \"7.28.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.28.1\"}, {\"status\": \"affected\", \"version\": \"7.28.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.28.0\"}, {\"status\": \"affected\", \"version\": \"7.27.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.27.0\"}, {\"status\": \"affected\", \"version\": \"7.26.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.26.0\"}, {\"status\": \"affected\", \"version\": \"7.25.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.25.0\"}, {\"status\": \"affected\", \"version\": \"7.24.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.24.0\"}, {\"status\": \"affected\", \"version\": \"7.23.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.23.1\"}, {\"status\": \"affected\", \"version\": \"7.23.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.23.0\"}, {\"status\": \"affected\", \"version\": \"7.22.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.22.0\"}, {\"status\": \"affected\", \"version\": \"7.21.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.7\"}, {\"status\": \"affected\", \"version\": \"7.21.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.6\"}, {\"status\": \"affected\", \"version\": \"7.21.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.5\"}, {\"status\": \"affected\", \"version\": \"7.21.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.4\"}, {\"status\": \"affected\", \"version\": \"7.21.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.3\"}, {\"status\": \"affected\", \"version\": \"7.21.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.2\"}, {\"status\": \"affected\", \"version\": \"7.21.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.1\"}, {\"status\": \"affected\", \"version\": \"7.21.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.21.0\"}, {\"status\": \"affected\", \"version\": \"7.20.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.20.1\"}, {\"status\": \"affected\", \"version\": \"7.20.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.20.0\"}, {\"status\": \"affected\", \"version\": \"7.19.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.7\"}, {\"status\": \"affected\", \"version\": \"7.19.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.6\"}, {\"status\": \"affected\", \"version\": \"7.19.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.5\"}, {\"status\": \"affected\", \"version\": \"7.19.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.4\"}, {\"status\": \"affected\", \"version\": \"7.19.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.3\"}, {\"status\": \"affected\", \"version\": \"7.19.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.2\"}, {\"status\": \"affected\", \"version\": \"7.19.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.1\"}, {\"status\": \"affected\", \"version\": \"7.19.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.19.0\"}, {\"status\": \"affected\", \"version\": \"7.18.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.2\"}, {\"status\": \"affected\", \"version\": \"7.18.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.1\"}, {\"status\": \"affected\", \"version\": \"7.18.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.18.0\"}, {\"status\": \"affected\", \"version\": \"7.17.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.17.1\"}, {\"status\": \"affected\", \"version\": \"7.17.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.17.0\"}, {\"status\": \"affected\", \"version\": \"7.16.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.4\"}, {\"status\": \"affected\", \"version\": \"7.16.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.3\"}, {\"status\": \"affected\", \"version\": \"7.16.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.2\"}, {\"status\": \"affected\", \"version\": \"7.16.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.1\"}, {\"status\": \"affected\", \"version\": \"7.16.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.16.0\"}, {\"status\": \"affected\", \"version\": \"7.15.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.5\"}, {\"status\": \"affected\", \"version\": \"7.15.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.4\"}, {\"status\": \"affected\", \"version\": \"7.15.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.3\"}, {\"status\": \"affected\", \"version\": \"7.15.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.2\"}, {\"status\": \"affected\", \"version\": \"7.15.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.1\"}, {\"status\": \"affected\", \"version\": \"7.15.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.15.0\"}, {\"status\": \"affected\", \"version\": \"7.14.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.14.1\"}, {\"status\": \"affected\", \"version\": \"7.14.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.14.0\"}, {\"status\": \"affected\", \"version\": \"7.13.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.2\"}, {\"status\": \"affected\", \"version\": \"7.13.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.1\"}, {\"status\": \"affected\", \"version\": \"7.13.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.13.0\"}, {\"status\": \"affected\", \"version\": \"7.12.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.3\"}, {\"status\": \"affected\", \"version\": \"7.12.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.2\"}, {\"status\": \"affected\", \"version\": \"7.12.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.1\"}, {\"status\": \"affected\", \"version\": \"7.12.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.12.0\"}, {\"status\": \"affected\", \"version\": \"7.11.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.2\"}, {\"status\": \"affected\", \"version\": \"7.11.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.1\"}, {\"status\": \"affected\", \"version\": \"7.11.0\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.11.0\"}, {\"status\": \"affected\", \"version\": \"7.10.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.8\"}, {\"status\": \"affected\", \"version\": \"7.10.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.7\"}, {\"status\": \"affected\", \"version\": \"7.10.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.6\"}, {\"status\": \"affected\", \"version\": \"7.10.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.5\"}, {\"status\": \"affected\", \"version\": \"7.10.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.4\"}, {\"status\": \"affected\", \"version\": \"7.10.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.3\"}, {\"status\": \"affected\", \"version\": \"7.10.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.2\"}, {\"status\": \"affected\", \"version\": \"7.10.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10.1\"}, {\"status\": \"affected\", \"version\": \"7.10\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.10\"}, {\"status\": \"affected\", \"version\": \"7.9.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.8\"}, {\"status\": \"affected\", \"version\": \"7.9.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.7\"}, {\"status\": \"affected\", \"version\": \"7.9.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.6\"}, {\"status\": \"affected\", \"version\": \"7.9.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.5\"}, {\"status\": \"affected\", \"version\": \"7.9.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.4\"}, {\"status\": \"affected\", \"version\": \"7.9.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.3\"}, {\"status\": \"affected\", \"version\": \"7.9.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.2\"}, {\"status\": \"affected\", \"version\": \"7.9.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9.1\"}, {\"status\": \"affected\", \"version\": \"7.9\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.9\"}, {\"status\": \"affected\", \"version\": \"7.8.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.8.1\"}, {\"status\": \"affected\", \"version\": \"7.8\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.8\"}, {\"status\": \"affected\", \"version\": \"7.7.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.3\"}, {\"status\": \"affected\", \"version\": \"7.7.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.2\"}, {\"status\": \"affected\", \"version\": \"7.7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7.1\"}, {\"status\": \"affected\", \"version\": \"7.7\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.7\"}, {\"status\": \"affected\", \"version\": \"7.6.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.6.1\"}, {\"status\": \"affected\", \"version\": \"7.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.6\"}, {\"status\": \"affected\", \"version\": \"7.5.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5.2\"}, {\"status\": \"affected\", \"version\": \"7.5.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5.1\"}, {\"status\": \"affected\", \"version\": \"7.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.5\"}, {\"status\": \"affected\", \"version\": \"7.4.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.2\"}, {\"status\": \"affected\", \"version\": \"7.4.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4.1\"}, {\"status\": \"affected\", \"version\": \"7.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.4\"}, {\"status\": \"affected\", \"version\": \"7.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.3\"}, {\"status\": \"affected\", \"version\": \"7.2.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2.1\"}, {\"status\": \"affected\", \"version\": \"7.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.2\"}, {\"status\": \"affected\", \"version\": \"7.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1.1\"}, {\"status\": \"affected\", \"version\": \"7.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.1\"}, {\"status\": \"affected\", \"version\": \"6.5.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.2\"}, {\"status\": \"affected\", \"version\": \"6.5.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5.1\"}, {\"status\": \"affected\", \"version\": \"6.5\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.5\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://curl.se/docs/CVE-2024-11053.json\", \"name\": \"json\"}, {\"url\": \"https://curl.se/docs/CVE-2024-11053.html\", \"name\": \"www\"}, {\"url\": \"https://hackerone.com/reports/2829063\", \"name\": \"issue\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When asked to both use a `.netrc` file for credentials and to follow HTTP\\nredirects, curl could leak the password used for the first host to the\\nfollowed-to host under certain circumstances.\\n\\nThis flaw only manifests itself if the netrc file has an entry that matches\\nthe redirect target hostname but the entry either omits just the password or\\nomits both login and password.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"shortName\": \"curl\", \"dateUpdated\": \"2024-12-11T07:34:29.539Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-11053\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-31T15:02:42.742Z\", \"dateReserved\": \"2024-11-09T18:41:55.703Z\", \"assignerOrgId\": \"2499f714-1537-4658-8207-48ae4bb9eae9\", \"datePublished\": \"2024-12-11T07:34:29.539Z\", \"assignerShortName\": \"curl\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  suse-su-2024:4284-2
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for curl",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for curl fixes the following issues:\n\n- CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4284,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4284",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4284-2.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4284-2",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244284-2/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4284-2",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020031.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234068",
        "url": "https://bugzilla.suse.com/1234068"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "Security update for curl",
    "tracking": {
      "current_release_date": "2024-12-19T10:22:01Z",
      "generator": {
        "date": "2024-12-19T10:22:01Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4284-2",
      "initial_release_date": "2024-12-19T10:22:01Z",
      "revision_history": [
        {
          "date": "2024-12-19T10:22:01Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "curl-8.0.1-11.101.1.aarch64",
                  "product_id": "curl-8.0.1-11.101.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.aarch64",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.aarch64",
                  "product_id": "libcurl4-8.0.1-11.101.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32",
                  "product_id": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32",
                  "product_id": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.i586",
                "product": {
                  "name": "curl-8.0.1-11.101.1.i586",
                  "product_id": "curl-8.0.1-11.101.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.i586",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.i586",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.i586",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.i586",
                  "product_id": "libcurl4-8.0.1-11.101.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "curl-8.0.1-11.101.1.ppc64le",
                  "product_id": "curl-8.0.1-11.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.ppc64le",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.ppc64le",
                  "product_id": "libcurl4-8.0.1-11.101.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.s390",
                "product": {
                  "name": "curl-8.0.1-11.101.1.s390",
                  "product_id": "curl-8.0.1-11.101.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.s390",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.s390",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.s390",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.s390",
                  "product_id": "libcurl4-8.0.1-11.101.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "curl-8.0.1-11.101.1.s390x",
                  "product_id": "curl-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl-devel-32bit-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl-devel-32bit-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl4-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl4-32bit-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl4-32bit-8.0.1-11.101.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "curl-8.0.1-11.101.1.x86_64",
                  "product_id": "curl-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl4-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl4-32bit-8.0.1-11.101.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "curl-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-19T10:22:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  suse-su-2024:4284-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for curl",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for curl fixes the following issues:\n\n- CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4284,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2024-4284",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4284-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4284-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244284-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4284-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019987.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234068",
        "url": "https://bugzilla.suse.com/1234068"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "Security update for curl",
    "tracking": {
      "current_release_date": "2024-12-19T10:22:01Z",
      "generator": {
        "date": "2024-12-19T10:22:01Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4284-1",
      "initial_release_date": "2024-12-19T10:22:01Z",
      "revision_history": [
        {
          "date": "2024-12-19T10:22:01Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "curl-8.0.1-11.101.1.aarch64",
                  "product_id": "curl-8.0.1-11.101.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.aarch64",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.aarch64",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.aarch64",
                  "product_id": "libcurl4-8.0.1-11.101.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32",
                  "product_id": "libcurl-devel-64bit-8.0.1-11.101.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32",
                  "product_id": "libcurl4-64bit-8.0.1-11.101.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.i586",
                "product": {
                  "name": "curl-8.0.1-11.101.1.i586",
                  "product_id": "curl-8.0.1-11.101.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.i586",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.i586",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.i586",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.i586",
                  "product_id": "libcurl4-8.0.1-11.101.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "curl-8.0.1-11.101.1.ppc64le",
                  "product_id": "curl-8.0.1-11.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.ppc64le",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.ppc64le",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.ppc64le",
                  "product_id": "libcurl4-8.0.1-11.101.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.s390",
                "product": {
                  "name": "curl-8.0.1-11.101.1.s390",
                  "product_id": "curl-8.0.1-11.101.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.s390",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.s390",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.s390",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.s390",
                  "product_id": "libcurl4-8.0.1-11.101.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "curl-8.0.1-11.101.1.s390x",
                  "product_id": "curl-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl-devel-32bit-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl-devel-32bit-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl4-8.0.1-11.101.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.0.1-11.101.1.s390x",
                "product": {
                  "name": "libcurl4-32bit-8.0.1-11.101.1.s390x",
                  "product_id": "libcurl4-32bit-8.0.1-11.101.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "curl-8.0.1-11.101.1.x86_64",
                  "product_id": "curl-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl-devel-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl-devel-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl-devel-32bit-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl4-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl4-8.0.1-11.101.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
                  "product_id": "libcurl4-32bit-8.0.1-11.101.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "curl-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.0.1-11.101.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.0.1-11.101.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:curl-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl-devel-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-32bit-8.0.1-11.101.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libcurl4-8.0.1-11.101.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-19T10:22:01Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  suse-su-2024:4288-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for curl",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for curl fixes the following issues:\n\n  - CVE-2024-11053: Fixed password leak used for the first host to the followed-to host under certain circumstances (bsc#1234068)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4288,SUSE-SLE-Module-Basesystem-15-SP6-2024-4288,openSUSE-SLE-15.6-2024-4288",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4288-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4288-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244288-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4288-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019983.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234068",
        "url": "https://bugzilla.suse.com/1234068"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "Security update for curl",
    "tracking": {
      "current_release_date": "2024-12-11T08:31:32Z",
      "generator": {
        "date": "2024-12-11T08:31:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4288-1",
      "initial_release_date": "2024-12-11T08:31:32Z",
      "revision_history": [
        {
          "date": "2024-12-11T08:31:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.6.0-150600.4.15.1.aarch64",
                "product": {
                  "name": "curl-8.6.0-150600.4.15.1.aarch64",
                  "product_id": "curl-8.6.0-150600.4.15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.6.0-150600.4.15.1.aarch64",
                "product": {
                  "name": "libcurl-devel-8.6.0-150600.4.15.1.aarch64",
                  "product_id": "libcurl-devel-8.6.0-150600.4.15.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.6.0-150600.4.15.1.aarch64",
                "product": {
                  "name": "libcurl4-8.6.0-150600.4.15.1.aarch64",
                  "product_id": "libcurl4-8.6.0-150600.4.15.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-devel-64bit-8.6.0-150600.4.15.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl-devel-64bit-8.6.0-150600.4.15.1.aarch64_ilp32",
                  "product_id": "libcurl-devel-64bit-8.6.0-150600.4.15.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-64bit-8.6.0-150600.4.15.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl4-64bit-8.6.0-150600.4.15.1.aarch64_ilp32",
                  "product_id": "libcurl4-64bit-8.6.0-150600.4.15.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.6.0-150600.4.15.1.i586",
                "product": {
                  "name": "curl-8.6.0-150600.4.15.1.i586",
                  "product_id": "curl-8.6.0-150600.4.15.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.6.0-150600.4.15.1.i586",
                "product": {
                  "name": "libcurl-devel-8.6.0-150600.4.15.1.i586",
                  "product_id": "libcurl-devel-8.6.0-150600.4.15.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.6.0-150600.4.15.1.i586",
                "product": {
                  "name": "libcurl4-8.6.0-150600.4.15.1.i586",
                  "product_id": "libcurl4-8.6.0-150600.4.15.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.6.0-150600.4.15.1.ppc64le",
                "product": {
                  "name": "curl-8.6.0-150600.4.15.1.ppc64le",
                  "product_id": "curl-8.6.0-150600.4.15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
                  "product_id": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.6.0-150600.4.15.1.ppc64le",
                "product": {
                  "name": "libcurl4-8.6.0-150600.4.15.1.ppc64le",
                  "product_id": "libcurl4-8.6.0-150600.4.15.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.6.0-150600.4.15.1.s390x",
                "product": {
                  "name": "curl-8.6.0-150600.4.15.1.s390x",
                  "product_id": "curl-8.6.0-150600.4.15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.6.0-150600.4.15.1.s390x",
                "product": {
                  "name": "libcurl-devel-8.6.0-150600.4.15.1.s390x",
                  "product_id": "libcurl-devel-8.6.0-150600.4.15.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.6.0-150600.4.15.1.s390x",
                "product": {
                  "name": "libcurl4-8.6.0-150600.4.15.1.s390x",
                  "product_id": "libcurl4-8.6.0-150600.4.15.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.6.0-150600.4.15.1.x86_64",
                "product": {
                  "name": "curl-8.6.0-150600.4.15.1.x86_64",
                  "product_id": "curl-8.6.0-150600.4.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.6.0-150600.4.15.1.x86_64",
                "product": {
                  "name": "libcurl-devel-8.6.0-150600.4.15.1.x86_64",
                  "product_id": "libcurl-devel-8.6.0-150600.4.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
                  "product_id": "libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.6.0-150600.4.15.1.x86_64",
                "product": {
                  "name": "libcurl4-8.6.0-150600.4.15.1.x86_64",
                  "product_id": "libcurl4-8.6.0-150600.4.15.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
                  "product_id": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.6.0-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "curl-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.6.0-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.aarch64"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.ppc64le"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.s390x"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.6.0-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl4-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.x86_64",
          "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.aarch64",
          "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.ppc64le",
          "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.s390x",
          "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.x86_64",
          "openSUSE Leap 15.6:libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
          "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
          "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
          "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
          "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
          "openSUSE Leap 15.6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
          "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.aarch64",
          "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
          "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.s390x",
          "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:curl-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP6:libcurl4-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:curl-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl-devel-32bit-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:libcurl-devel-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl4-32bit-8.6.0-150600.4.15.1.x86_64",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.aarch64",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.ppc64le",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.s390x",
            "openSUSE Leap 15.6:libcurl4-8.6.0-150600.4.15.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-11T08:31:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  suse-su-2024:4359-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for curl",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for curl fixes the following issues:\n\n - CVE-2024-11053: Fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4359,SUSE-SLE-INSTALLER-15-SP5-2024-4359,SUSE-SLE-Micro-5.3-2024-4359,SUSE-SLE-Micro-5.4-2024-4359,SUSE-SLE-Micro-5.5-2024-4359,SUSE-SLE-Module-Basesystem-15-SP5-2024-4359,openSUSE-Leap-Micro-5.5-2024-4359,openSUSE-SLE-15.5-2024-4359",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4359-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4359-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244359-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4359-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020021.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234068",
        "url": "https://bugzilla.suse.com/1234068"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "Security update for curl",
    "tracking": {
      "current_release_date": "2024-12-17T13:19:34Z",
      "generator": {
        "date": "2024-12-17T13:19:34Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4359-1",
      "initial_release_date": "2024-12-17T13:19:34Z",
      "revision_history": [
        {
          "date": "2024-12-17T13:19:34Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-150400.5.59.1.aarch64",
                "product": {
                  "name": "curl-8.0.1-150400.5.59.1.aarch64",
                  "product_id": "curl-8.0.1-150400.5.59.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-150400.5.59.1.aarch64",
                "product": {
                  "name": "libcurl-devel-8.0.1-150400.5.59.1.aarch64",
                  "product_id": "libcurl-devel-8.0.1-150400.5.59.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-150400.5.59.1.aarch64",
                "product": {
                  "name": "libcurl4-8.0.1-150400.5.59.1.aarch64",
                  "product_id": "libcurl4-8.0.1-150400.5.59.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-devel-64bit-8.0.1-150400.5.59.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl-devel-64bit-8.0.1-150400.5.59.1.aarch64_ilp32",
                  "product_id": "libcurl-devel-64bit-8.0.1-150400.5.59.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-64bit-8.0.1-150400.5.59.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl4-64bit-8.0.1-150400.5.59.1.aarch64_ilp32",
                  "product_id": "libcurl4-64bit-8.0.1-150400.5.59.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-150400.5.59.1.i586",
                "product": {
                  "name": "curl-8.0.1-150400.5.59.1.i586",
                  "product_id": "curl-8.0.1-150400.5.59.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-150400.5.59.1.i586",
                "product": {
                  "name": "libcurl-devel-8.0.1-150400.5.59.1.i586",
                  "product_id": "libcurl-devel-8.0.1-150400.5.59.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-150400.5.59.1.i586",
                "product": {
                  "name": "libcurl4-8.0.1-150400.5.59.1.i586",
                  "product_id": "libcurl4-8.0.1-150400.5.59.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-150400.5.59.1.ppc64le",
                "product": {
                  "name": "curl-8.0.1-150400.5.59.1.ppc64le",
                  "product_id": "curl-8.0.1-150400.5.59.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
                  "product_id": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
                "product": {
                  "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
                  "product_id": "libcurl4-8.0.1-150400.5.59.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-150400.5.59.1.s390x",
                "product": {
                  "name": "curl-8.0.1-150400.5.59.1.s390x",
                  "product_id": "curl-8.0.1-150400.5.59.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-150400.5.59.1.s390x",
                "product": {
                  "name": "libcurl-devel-8.0.1-150400.5.59.1.s390x",
                  "product_id": "libcurl-devel-8.0.1-150400.5.59.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-150400.5.59.1.s390x",
                "product": {
                  "name": "libcurl4-8.0.1-150400.5.59.1.s390x",
                  "product_id": "libcurl4-8.0.1-150400.5.59.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.0.1-150400.5.59.1.x86_64",
                "product": {
                  "name": "curl-8.0.1-150400.5.59.1.x86_64",
                  "product_id": "curl-8.0.1-150400.5.59.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.0.1-150400.5.59.1.x86_64",
                "product": {
                  "name": "libcurl-devel-8.0.1-150400.5.59.1.x86_64",
                  "product_id": "libcurl-devel-8.0.1-150400.5.59.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
                  "product_id": "libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.0.1-150400.5.59.1.x86_64",
                "product": {
                  "name": "libcurl4-8.0.1-150400.5.59.1.x86_64",
                  "product_id": "libcurl4-8.0.1-150400.5.59.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
                  "product_id": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Installer Updates 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Installer Updates 15 SP5",
                  "product_id": "SUSE Linux Enterprise Installer Updates 15 SP5"
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.3",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.3",
                  "product_id": "SUSE Linux Enterprise Micro 5.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.4",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.4",
                  "product_id": "SUSE Linux Enterprise Micro 5.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.5",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.5",
                  "product_id": "SUSE Linux Enterprise Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap Micro 5.5",
                "product": {
                  "name": "openSUSE Leap Micro 5.5",
                  "product_id": "openSUSE Leap Micro 5.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap-micro:5.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
          "product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Installer Updates 15 SP5",
          "product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Installer Updates 15 SP5",
          "product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
          "product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
          "product_id": "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
          "product_id": "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
          "product_id": "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap Micro 5.5",
          "product_id": "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap Micro 5.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "curl-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.aarch64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.ppc64le"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.s390x"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.aarch64",
          "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.ppc64le",
          "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.s390x",
          "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap 15.5:libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
          "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
          "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
          "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap 15.5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
          "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.s390x",
          "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
          "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
          "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
          "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
          "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
          "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Installer Updates 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.3:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.4:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:curl-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:curl-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl-devel-32bit-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:libcurl-devel-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl4-32bit-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.ppc64le",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap 15.5:libcurl4-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap Micro 5.5:curl-8.0.1-150400.5.59.1.x86_64",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.aarch64",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.s390x",
            "openSUSE Leap Micro 5.5:libcurl4-8.0.1-150400.5.59.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-17T13:19:34Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  suse-su-2024:4287-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for curl",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for curl fixes the following issues:\n\n- CVE-2024-11053: fixed password leak in curl used for the first host to the followed-to host under certain circumstances (bsc#1234068)\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-4287,SUSE-SUSE-MicroOS-5.1-2024-4287,SUSE-SUSE-MicroOS-5.2-2024-4287",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_4287-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:4287-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20244287-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:4287-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019984.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234068",
        "url": "https://bugzilla.suse.com/1234068"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "Security update for curl",
    "tracking": {
      "current_release_date": "2024-12-11T08:31:19Z",
      "generator": {
        "date": "2024-12-11T08:31:19Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:4287-1",
      "initial_release_date": "2024-12-11T08:31:19Z",
      "revision_history": [
        {
          "date": "2024-12-11T08:31:19Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "curl-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "curl-7.66.0-150200.4.81.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-mini-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "curl-mini-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "curl-mini-7.66.0-150200.4.81.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "libcurl-devel-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "libcurl-devel-7.66.0-150200.4.81.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "libcurl-mini-devel-7.66.0-150200.4.81.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "libcurl4-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "libcurl4-7.66.0-150200.4.81.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-mini-7.66.0-150200.4.81.1.aarch64",
                "product": {
                  "name": "libcurl4-mini-7.66.0-150200.4.81.1.aarch64",
                  "product_id": "libcurl4-mini-7.66.0-150200.4.81.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libcurl-devel-64bit-7.66.0-150200.4.81.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl-devel-64bit-7.66.0-150200.4.81.1.aarch64_ilp32",
                  "product_id": "libcurl-devel-64bit-7.66.0-150200.4.81.1.aarch64_ilp32"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-64bit-7.66.0-150200.4.81.1.aarch64_ilp32",
                "product": {
                  "name": "libcurl4-64bit-7.66.0-150200.4.81.1.aarch64_ilp32",
                  "product_id": "libcurl4-64bit-7.66.0-150200.4.81.1.aarch64_ilp32"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64_ilp32"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "curl-7.66.0-150200.4.81.1.i586",
                  "product_id": "curl-7.66.0-150200.4.81.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "curl-mini-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "curl-mini-7.66.0-150200.4.81.1.i586",
                  "product_id": "curl-mini-7.66.0-150200.4.81.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "libcurl-devel-7.66.0-150200.4.81.1.i586",
                  "product_id": "libcurl-devel-7.66.0-150200.4.81.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.i586",
                  "product_id": "libcurl-mini-devel-7.66.0-150200.4.81.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "libcurl4-7.66.0-150200.4.81.1.i586",
                  "product_id": "libcurl4-7.66.0-150200.4.81.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-mini-7.66.0-150200.4.81.1.i586",
                "product": {
                  "name": "libcurl4-mini-7.66.0-150200.4.81.1.i586",
                  "product_id": "libcurl4-mini-7.66.0-150200.4.81.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "curl-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "curl-7.66.0-150200.4.81.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "curl-mini-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "curl-mini-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "curl-mini-7.66.0-150200.4.81.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "libcurl-devel-7.66.0-150200.4.81.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "libcurl-mini-devel-7.66.0-150200.4.81.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "libcurl4-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "libcurl4-7.66.0-150200.4.81.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-mini-7.66.0-150200.4.81.1.ppc64le",
                "product": {
                  "name": "libcurl4-mini-7.66.0-150200.4.81.1.ppc64le",
                  "product_id": "libcurl4-mini-7.66.0-150200.4.81.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "curl-7.66.0-150200.4.81.1.s390x",
                  "product_id": "curl-7.66.0-150200.4.81.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "curl-mini-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "curl-mini-7.66.0-150200.4.81.1.s390x",
                  "product_id": "curl-mini-7.66.0-150200.4.81.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "libcurl-devel-7.66.0-150200.4.81.1.s390x",
                  "product_id": "libcurl-devel-7.66.0-150200.4.81.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.s390x",
                  "product_id": "libcurl-mini-devel-7.66.0-150200.4.81.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "libcurl4-7.66.0-150200.4.81.1.s390x",
                  "product_id": "libcurl4-7.66.0-150200.4.81.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-mini-7.66.0-150200.4.81.1.s390x",
                "product": {
                  "name": "libcurl4-mini-7.66.0-150200.4.81.1.s390x",
                  "product_id": "libcurl4-mini-7.66.0-150200.4.81.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "curl-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "curl-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-mini-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "curl-mini-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "curl-mini-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl-devel-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl-devel-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl-devel-32bit-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl-mini-devel-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl-mini-devel-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl4-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl4-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl4-32bit-7.66.0-150200.4.81.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-mini-7.66.0-150200.4.81.1.x86_64",
                "product": {
                  "name": "libcurl4-mini-7.66.0-150200.4.81.1.x86_64",
                  "product_id": "libcurl4-mini-7.66.0-150200.4.81.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.1",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.1",
                  "product_id": "SUSE Linux Enterprise Micro 5.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.aarch64"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.s390x"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.x86_64"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.aarch64"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.s390x"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
          "product_id": "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.x86_64"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.aarch64"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.s390x"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-7.66.0-150200.4.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.x86_64"
        },
        "product_reference": "curl-7.66.0-150200.4.81.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.aarch64"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.s390x"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-7.66.0-150200.4.81.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.x86_64"
        },
        "product_reference": "libcurl4-7.66.0-150200.4.81.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.x86_64",
          "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.aarch64",
          "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.s390x",
          "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.aarch64",
          "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.s390x",
          "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:curl-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.1:libcurl4-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:curl-7.66.0-150200.4.81.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.aarch64",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.s390x",
            "SUSE Linux Enterprise Micro 5.2:libcurl4-7.66.0-150200.4.81.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-11T08:31:19Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  wid-sec-w-2024-3676
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "cURL ist eine Client-Software, die das Austauschen von Dateien mittels mehrerer Protokolle wie z. B. HTTP oder FTP erlaubt.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in cURL ausnutzen, um Informationen offenzulegen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- UNIX",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3676 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3676.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3676 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3676"
      },
      {
        "category": "external",
        "summary": "curl Security Advisory vom 2024-12-10",
        "url": "https://curl.se/docs/CVE-2024-11053.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:4284-1 vom 2024-12-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019987.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:4287-1 vom 2024-12-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019984.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:4288-1 vom 2024-12-11",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019983.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-7162-1 vom 2024-12-16",
        "url": "https://ubuntu.com/security/notices/USN-7162-1"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:4359-1 vom 2024-12-17",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/W3C7YLNBMW5MPRUQMR5IFUYVSRD5UKHG/"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:4284-2 vom 2024-12-19",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020031.html"
      }
    ],
    "source_lang": "en-US",
    "title": "cURL: Schwachstelle erm\u00f6glicht Offenlegung von Informationen",
    "tracking": {
      "current_release_date": "2024-12-19T23:00:00.000+00:00",
      "generator": {
        "date": "2024-12-20T09:12:25.445+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.10"
        }
      },
      "id": "WID-SEC-W-2024-3676",
      "initial_release_date": "2024-12-10T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-12-10T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-12-11T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-12-16T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-12-17T23:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-12-19T23:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        }
      ],
      "status": "final",
      "version": "5"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c8.11.1",
                "product": {
                  "name": "Open Source cURL \u003c8.11.1",
                  "product_id": "T039776"
                }
              },
              {
                "category": "product_version",
                "name": "8.11.1",
                "product": {
                  "name": "Open Source cURL 8.11.1",
                  "product_id": "T039776-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:curl:curl:8.11.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "cURL"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "notes": [
        {
          "category": "description",
          "text": "Es besteht eine Schwachstelle in cURL. Dieser Fehler existiert wegen der unsachgem\u00e4\u00dfen Behandlung von Anmeldeinformationen aus der .netrc-Datei, wenn HTTP-Umleitungen gefolgt wird. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um unter bestimmten Bedingungen das f\u00fcr den ersten Host verwendete Passwort an einen umgeleiteten Host weiterzugeben."
        }
      ],
      "product_status": {
        "known_affected": [
          "T002207",
          "T000126",
          "T039776"
        ]
      },
      "release_date": "2024-12-10T23:00:00.000+00:00",
      "title": "CVE-2024-11053"
    }
  ]
}
  ncsc-2025-0123
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in diverse Oracle Database Producten en subsystemen, zoals Oracle Server, NoSQL, TimesTen, Secure Backup en Essbase.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om een Denial-of-Service te veroorzaken of om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en gegevens te manipuleren. Subcomponenten als de RDBMS Listener, Java VM, en andere componenten zijn specifiek kwetsbaar, met CVSS-scores vari\u00ebrend van 5.3 tot 7.5, wat duidt op een gematigd tot hoog risico.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Covert Timing Channel",
        "title": "CWE-385"
      },
      {
        "category": "general",
        "text": "Improper Verification of Cryptographic Signature",
        "title": "CWE-347"
      },
      {
        "category": "general",
        "text": "Improper Validation of Syntactic Correctness of Input",
        "title": "CWE-1286"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
        "title": "CWE-44"
      },
      {
        "category": "general",
        "text": "Sensitive Information in Resource Not Removed Before Reuse",
        "title": "CWE-226"
      },
      {
        "category": "general",
        "text": "Use of Incorrectly-Resolved Name or Reference",
        "title": "CWE-706"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Improper Handling of Exceptional Conditions",
        "title": "CWE-755"
      },
      {
        "category": "general",
        "text": "Improper Handling of Case Sensitivity",
        "title": "CWE-178"
      },
      {
        "category": "general",
        "text": "Off-by-one Error",
        "title": "CWE-193"
      },
      {
        "category": "general",
        "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
        "title": "CWE-601"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Unprotected Transport of Credentials",
        "title": "CWE-523"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
        "title": "CWE-614"
      },
      {
        "category": "general",
        "text": "Improper Authorization",
        "title": "CWE-285"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
        "title": "CWE-1321"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Incomplete Cleanup",
        "title": "CWE-459"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
        "title": "CWE-74"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Authentication",
        "title": "CWE-287"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Database Producten",
    "tracking": {
      "current_release_date": "2025-04-16T08:37:39.412900Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0123",
      "initial_release_date": "2025-04-16T08:37:39.412900Z",
      "revision_history": [
        {
          "date": "2025-04-16T08:37:39.412900Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/22.1",
                    "product": {
                      "name": "vers:unknown/22.1",
                      "product_id": "CSAFPID-1304603"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Database Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/13.5.0.0",
                    "product": {
                      "name": "vers:unknown/13.5.0.0",
                      "product_id": "CSAFPID-1201359"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Enterprise Manager for Oracle Database"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
                    "product": {
                      "name": "vers:unknown/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
                      "product_id": "CSAFPID-2698376"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=21.3|\u003c=21.17",
                    "product": {
                      "name": "vers:unknown/\u003e=21.3|\u003c=21.17",
                      "product_id": "CSAFPID-2698377"
                    }
                  }
                ],
                "category": "product_name",
                "name": "GoldenGate"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.1",
                    "product": {
                      "name": "vers:oracle/23.1",
                      "product_id": "CSAFPID-1238473"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/2.0",
                    "product": {
                      "name": "vers:unknown/2.0",
                      "product_id": "CSAFPID-1237753"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/20.2",
                    "product": {
                      "name": "vers:unknown/20.2",
                      "product_id": "CSAFPID-1238475"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/23.1",
                    "product": {
                      "name": "vers:unknown/23.1",
                      "product_id": "CSAFPID-1296375"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/none",
                    "product": {
                      "name": "vers:unknown/none",
                      "product_id": "CSAFPID-1237603"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Big Data Spatial and Graph"
              }
            ],
            "category": "product_family",
            "name": "Oracle"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=19.3|\u003c=19.22",
                "product": {
                  "name": "vers:oracle/\u003e=19.3|\u003c=19.22",
                  "product_id": "CSAFPID-1145825"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=21.3|\u003c=21.13",
                "product": {
                  "name": "vers:oracle/\u003e=21.3|\u003c=21.13",
                  "product_id": "CSAFPID-1145826"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Database Server"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=19.3|\u003c=19.26",
                    "product": {
                      "name": "vers:oracle/\u003e=19.3|\u003c=19.26",
                      "product_id": "CSAFPID-2698969",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:database_-_java_vm:19.3-19.26:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=21.3|\u003c=21.17",
                    "product": {
                      "name": "vers:oracle/\u003e=21.3|\u003c=21.17",
                      "product_id": "CSAFPID-2698968",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:database_-_java_vm:21.3-21.17:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=21.4|\u003c=21.16",
                    "product": {
                      "name": "vers:oracle/\u003e=21.4|\u003c=21.16",
                      "product_id": "CSAFPID-1839905",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:database_-_workload_manager:21.4-21.16:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.4|\u003c=23.7",
                    "product": {
                      "name": "vers:oracle/\u003e=23.4|\u003c=23.7",
                      "product_id": "CSAFPID-2698934",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:database_-_java_vm:23.4-23.7:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Database Server"
              }
            ],
            "category": "product_family",
            "name": "Oracle Database Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/13.5.0.0",
                "product": {
                  "name": "vers:oracle/13.5.0.0",
                  "product_id": "CSAFPID-1144644"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Enterprise Manager for Oracle Database"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/1.5.0",
                    "product": {
                      "name": "vers:oracle/1.5.0",
                      "product_id": "CSAFPID-2699002",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:nosql_database:1.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/1.6.0",
                    "product": {
                      "name": "vers:oracle/1.6.0",
                      "product_id": "CSAFPID-2699003",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:nosql_database:1.6.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/1.6.1",
                    "product": {
                      "name": "vers:oracle/1.6.1",
                      "product_id": "CSAFPID-2699004",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:nosql_database:1.6.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle NoSQL Database"
              }
            ],
            "category": "product_family",
            "name": "Oracle NoSQL Database"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
                    "product": {
                      "name": "vers:oracle/\u003e=22.1.1.1.0|\u003c=22.1.1.30.0",
                      "product_id": "CSAFPID-2699053",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:timesten_in-memory_database:22.1.1.1.0-22.1.1.30.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle TimesTen In-Memory Database"
              }
            ],
            "category": "product_family",
            "name": "Oracle TimesTen In-Memory Database"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.1.0",
                    "product": {
                      "name": "vers:oracle/25.1.0",
                      "product_id": "CSAFPID-2698932",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.1.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.2.0",
                    "product": {
                      "name": "vers:oracle/25.2.0",
                      "product_id": "CSAFPID-2698931",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:25.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
                    "product": {
                      "name": "vers:oracle/\u003e=23.8.0|\u003c=23.11.0",
                      "product_id": "CSAFPID-2698930",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:23.8.0-23.11.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
                    "product": {
                      "name": "vers:oracle/\u003e=24.1.0|\u003c=24.11.0",
                      "product_id": "CSAFPID-2698933",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:autonomous_health_framework:24.1.0-24.11.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Autonomous Health Framework"
              }
            ],
            "category": "product_family",
            "name": "Oracle Autonomous Health Framework"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/21.7.1.0.0",
                    "product": {
                      "name": "vers:oracle/21.7.1.0.0",
                      "product_id": "CSAFPID-2698943",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:essbase:21.7.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Essbase"
              }
            ],
            "category": "product_family",
            "name": "Oracle Essbase"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
                    "product": {
                      "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.10",
                      "product_id": "CSAFPID-2698949",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate_stream_analytics:19.1.0.0.0-19.1.0.0.10:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "GoldenGate Stream Analytics"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
                    "product": {
                      "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.26.0.0.250219",
                      "product_id": "CSAFPID-2698941",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.26.0.0.250219:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=21.3|\u003c=21.17",
                    "product": {
                      "name": "vers:oracle/\u003e=21.3|\u003c=21.17",
                      "product_id": "CSAFPID-2698942",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.17:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.4|\u003c=23.7",
                    "product": {
                      "name": "vers:oracle/\u003e=23.4|\u003c=23.7",
                      "product_id": "CSAFPID-2699022",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.7:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle GoldenGate"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
                    "product": {
                      "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.18",
                      "product_id": "CSAFPID-1839977",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
                    "product": {
                      "name": "vers:oracle/\u003e=21.3.0.0.0|\u003c=21.16.0.0.0",
                      "product_id": "CSAFPID-1840034",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.4|\u003c=23.6",
                    "product": {
                      "name": "vers:oracle/\u003e=23.4|\u003c=23.6",
                      "product_id": "CSAFPID-1840035",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle GoldenGate Big Data and Application Adapters"
              }
            ],
            "category": "product_family",
            "name": "Oracle GoldenGate"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
                "product": {
                  "name": "vers:oracle/\u003e=19.1.0.0.0|\u003c=19.1.0.0.7",
                  "product_id": "CSAFPID-1144602"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle GoldenGate Stream Analytics"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003c23.1",
                "product": {
                  "name": "vers:oracle/\u003c23.1",
                  "product_id": "CSAFPID-1145800"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/2.0",
                "product": {
                  "name": "vers:unknown/2.0",
                  "product_id": "CSAFPID-356315",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:ibm:oracle_big_data_spatial_and_graph:2.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/23.1",
                "product": {
                  "name": "vers:unknown/23.1",
                  "product_id": "CSAFPID-356152"
                }
              }
            ],
            "category": "product_name",
            "name": "Big Data Spatial and Graph"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.3",
                    "product": {
                      "name": "vers:oracle/23.4.3",
                      "product_id": "CSAFPID-2699065",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2699066",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.4",
                    "product": {
                      "name": "vers:oracle/23.4.4",
                      "product_id": "CSAFPID-1840017",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.4.0",
                    "product": {
                      "name": "vers:oracle/24.4.0",
                      "product_id": "CSAFPID-1840013",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Graph Server and Client"
              }
            ],
            "category": "product_family",
            "name": "Oracle Graph Server and Client"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003c=22.4.7",
                "product": {
                  "name": "vers:oracle/\u003c=22.4.7",
                  "product_id": "CSAFPID-1145419",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:graph_server_and_client:22.4.7_and_prior:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003c=23.4.2",
                "product": {
                  "name": "vers:oracle/\u003c=23.4.2",
                  "product_id": "CSAFPID-1145421",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:graph_server_and_client:23.4.2_and_prior:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003c=24.1.0",
                "product": {
                  "name": "vers:oracle/\u003c=24.1.0",
                  "product_id": "CSAFPID-1145422",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:graph_server_and_client:24.1.0_and_prior:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Graph Server and Client"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/3.0.6",
                "product": {
                  "name": "vers:oracle/3.0.6",
                  "product_id": "CSAFPID-1145420",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:big_data_spatial_and_graph:3.0.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Big Data Spatial and Graph"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.1.0.1",
                    "product": {
                      "name": "vers:oracle/12.1.0.1",
                      "product_id": "CSAFPID-2699109",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.1.0.2",
                    "product": {
                      "name": "vers:oracle/12.1.0.2",
                      "product_id": "CSAFPID-2699107",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.1.0.3",
                    "product": {
                      "name": "vers:oracle/12.1.0.3",
                      "product_id": "CSAFPID-2699106",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:12.1.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/18.1.0.0",
                    "product": {
                      "name": "vers:oracle/18.1.0.0",
                      "product_id": "CSAFPID-2699110",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/18.1.0.1",
                    "product": {
                      "name": "vers:oracle/18.1.0.1",
                      "product_id": "CSAFPID-2698972",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/18.1.0.2",
                    "product": {
                      "name": "vers:oracle/18.1.0.2",
                      "product_id": "CSAFPID-2699108",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Secure Backup"
              }
            ],
            "category": "product_family",
            "name": "Oracle Secure Backup"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/19.3|\u003c=19.26",
                "product": {
                  "name": "vers:semver/19.3|\u003c=19.26",
                  "product_id": "CSAFPID-2698485"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/21.3|\u003c=21.17",
                "product": {
                  "name": "vers:semver/21.3|\u003c=21.17",
                  "product_id": "CSAFPID-2698486"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/23.4|\u003c=23.7",
                "product": {
                  "name": "vers:semver/23.4|\u003c=23.7",
                  "product_id": "CSAFPID-2698487"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Database Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/12.1.0.1",
                "product": {
                  "name": "vers:semver/12.1.0.1",
                  "product_id": "CSAFPID-2698463"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/12.1.0.2",
                "product": {
                  "name": "vers:semver/12.1.0.2",
                  "product_id": "CSAFPID-2698464"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/12.1.0.3",
                "product": {
                  "name": "vers:semver/12.1.0.3",
                  "product_id": "CSAFPID-2698465"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/18.1.0.0",
                "product": {
                  "name": "vers:semver/18.1.0.0",
                  "product_id": "CSAFPID-2698466"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/18.1.0.1",
                "product": {
                  "name": "vers:semver/18.1.0.1",
                  "product_id": "CSAFPID-2698467"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/18.1.0.2",
                "product": {
                  "name": "vers:semver/18.1.0.2",
                  "product_id": "CSAFPID-2698468"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Secure Backup"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-1935",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-1935",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1935.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2020-1935"
    },
    {
      "cve": "CVE-2020-1938",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Authorization",
          "title": "CWE-285"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-1938",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-1938.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2020-1938"
    },
    {
      "cve": "CVE-2020-9484",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-9484",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-9484.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2020-9484"
    },
    {
      "cve": "CVE-2020-11996",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-11996",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-11996.json"
        }
      ],
      "title": "CVE-2020-11996"
    },
    {
      "cve": "CVE-2020-13935",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-13935",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13935.json"
        }
      ],
      "title": "CVE-2020-13935"
    },
    {
      "cve": "CVE-2020-13943",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-13943",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13943.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2020-13943"
    },
    {
      "cve": "CVE-2020-36843",
      "cwe": {
        "id": "CWE-347",
        "name": "Improper Verification of Cryptographic Signature"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Verification of Cryptographic Signature",
          "title": "CWE-347"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-36843",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-36843.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2020-36843"
    },
    {
      "cve": "CVE-2021-24122",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-24122",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24122.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-24122"
    },
    {
      "cve": "CVE-2021-25122",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-25122",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25122.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-25122"
    },
    {
      "cve": "CVE-2021-25329",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-25329",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-25329.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-25329"
    },
    {
      "cve": "CVE-2021-30640",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Authentication",
          "title": "CWE-287"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-30640",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-30640.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-30640"
    },
    {
      "cve": "CVE-2021-33037",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-33037",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33037.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-33037"
    },
    {
      "cve": "CVE-2021-41079",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-41079",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41079.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-41079"
    },
    {
      "cve": "CVE-2021-41184",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-41184",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-41184.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-41184"
    },
    {
      "cve": "CVE-2021-42575",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-42575",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-42575.json"
        }
      ],
      "title": "CVE-2021-42575"
    },
    {
      "cve": "CVE-2021-43980",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-43980",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-43980.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2021-43980"
    },
    {
      "cve": "CVE-2022-3786",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "other",
          "text": "Off-by-one Error",
          "title": "CWE-193"
        },
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-3786",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-3786.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2022-3786"
    },
    {
      "cve": "CVE-2022-25762",
      "cwe": {
        "id": "CWE-226",
        "name": "Sensitive Information in Resource Not Removed Before Reuse"
      },
      "notes": [
        {
          "category": "other",
          "text": "Sensitive Information in Resource Not Removed Before Reuse",
          "title": "CWE-226"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-25762",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-25762.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2022-25762"
    },
    {
      "cve": "CVE-2022-42252",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-42252",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-42252.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2022-42252"
    },
    {
      "cve": "CVE-2023-28708",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Unprotected Transport of Credentials",
          "title": "CWE-523"
        },
        {
          "category": "other",
          "text": "Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute",
          "title": "CWE-614"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-28708",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-28708.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-28708"
    },
    {
      "cve": "CVE-2023-34053",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-34053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-34053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-34053"
    },
    {
      "cve": "CVE-2023-41080",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
          "title": "CWE-601"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-41080",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-41080.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-41080"
    },
    {
      "cve": "CVE-2023-42795",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incomplete Cleanup",
          "title": "CWE-459"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-42795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-42795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-42795"
    },
    {
      "cve": "CVE-2023-44487",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-44487",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-44487"
    },
    {
      "cve": "CVE-2023-45648",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-45648",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45648.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-45648"
    },
    {
      "cve": "CVE-2023-46589",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46589",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46589.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2023-46589"
    },
    {
      "cve": "CVE-2024-6763",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Syntactic Correctness of Input",
          "title": "CWE-1286"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6763",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
        }
      ],
      "title": "CVE-2024-6763"
    },
    {
      "cve": "CVE-2024-8176",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-8176",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8176.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-8176"
    },
    {
      "cve": "CVE-2024-8184",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-8184",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8184.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-8184"
    },
    {
      "cve": "CVE-2024-9143",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-9143",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
        }
      ],
      "title": "CVE-2024-9143"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-11233",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11233",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11233.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-11233"
    },
    {
      "cve": "CVE-2024-11234",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
          "title": "CWE-74"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11234",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11234.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-11234"
    },
    {
      "cve": "CVE-2024-11236",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11236",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11236.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-11236"
    },
    {
      "cve": "CVE-2024-13176",
      "cwe": {
        "id": "CWE-385",
        "name": "Covert Timing Channel"
      },
      "notes": [
        {
          "category": "other",
          "text": "Covert Timing Channel",
          "title": "CWE-385"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-13176",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-13176.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-13176"
    },
    {
      "cve": "CVE-2024-23672",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incomplete Cleanup",
          "title": "CWE-459"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23672",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-24549",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24549",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-36114",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-36114",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-36114"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38819",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38819",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-38819"
    },
    {
      "cve": "CVE-2024-38820",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Handling of Case Sensitivity",
          "title": "CWE-178"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38820",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-38820"
    },
    {
      "cve": "CVE-2024-38999",
      "cwe": {
        "id": "CWE-1321",
        "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
          "title": "CWE-1321"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38999",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-38999"
    },
    {
      "cve": "CVE-2024-39338",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39338",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39338.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-39338"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-47561",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-47561"
    },
    {
      "cve": "CVE-2024-53382",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53382",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53382.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-53382"
    },
    {
      "cve": "CVE-2024-57699",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57699",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2024-57699"
    },
    {
      "cve": "CVE-2025-21578",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21578",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21578.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-21578"
    },
    {
      "cve": "CVE-2025-24813",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "other",
          "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
          "title": "CWE-44"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Use of Incorrectly-Resolved Name or Reference",
          "title": "CWE-706"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24813",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-24813"
    },
    {
      "cve": "CVE-2025-24970",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24970",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-24970"
    },
    {
      "cve": "CVE-2025-25193",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-25193",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-25193.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-25193"
    },
    {
      "cve": "CVE-2025-26791",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-26791",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-26791.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-26791"
    },
    {
      "cve": "CVE-2025-30694",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30694",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30694.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-30694"
    },
    {
      "cve": "CVE-2025-30701",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30701",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30701.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-30701"
    },
    {
      "cve": "CVE-2025-30702",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30702",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30702.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-30702"
    },
    {
      "cve": "CVE-2025-30733",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30733",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30733.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-30733"
    },
    {
      "cve": "CVE-2025-30736",
      "product_status": {
        "known_affected": [
          "CSAFPID-1304603",
          "CSAFPID-1201359",
          "CSAFPID-1145825",
          "CSAFPID-2698969",
          "CSAFPID-1145826",
          "CSAFPID-2698968",
          "CSAFPID-1839905",
          "CSAFPID-2698934",
          "CSAFPID-1144644",
          "CSAFPID-2699002",
          "CSAFPID-2699003",
          "CSAFPID-2699004",
          "CSAFPID-2699053",
          "CSAFPID-2698485",
          "CSAFPID-2698486",
          "CSAFPID-2698487",
          "CSAFPID-2698932",
          "CSAFPID-2698931",
          "CSAFPID-2698930",
          "CSAFPID-2698933",
          "CSAFPID-2698943",
          "CSAFPID-2698376",
          "CSAFPID-2698377",
          "CSAFPID-2698949",
          "CSAFPID-2698941",
          "CSAFPID-2698942",
          "CSAFPID-2699022",
          "CSAFPID-1839977",
          "CSAFPID-1840034",
          "CSAFPID-1840035",
          "CSAFPID-1144602",
          "CSAFPID-1238473",
          "CSAFPID-1145800",
          "CSAFPID-356315",
          "CSAFPID-1237753",
          "CSAFPID-1238475",
          "CSAFPID-1296375",
          "CSAFPID-356152",
          "CSAFPID-1237603",
          "CSAFPID-2699065",
          "CSAFPID-2699066",
          "CSAFPID-1840017",
          "CSAFPID-1840013",
          "CSAFPID-1145419",
          "CSAFPID-1145421",
          "CSAFPID-1145422",
          "CSAFPID-1145420",
          "CSAFPID-2699109",
          "CSAFPID-2699107",
          "CSAFPID-2699106",
          "CSAFPID-2699110",
          "CSAFPID-2698972",
          "CSAFPID-2699108",
          "CSAFPID-2698463",
          "CSAFPID-2698464",
          "CSAFPID-2698465",
          "CSAFPID-2698466",
          "CSAFPID-2698467",
          "CSAFPID-2698468"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1304603",
            "CSAFPID-1201359",
            "CSAFPID-1145825",
            "CSAFPID-2698969",
            "CSAFPID-1145826",
            "CSAFPID-2698968",
            "CSAFPID-1839905",
            "CSAFPID-2698934",
            "CSAFPID-1144644",
            "CSAFPID-2699002",
            "CSAFPID-2699003",
            "CSAFPID-2699004",
            "CSAFPID-2699053",
            "CSAFPID-2698485",
            "CSAFPID-2698486",
            "CSAFPID-2698487",
            "CSAFPID-2698932",
            "CSAFPID-2698931",
            "CSAFPID-2698930",
            "CSAFPID-2698933",
            "CSAFPID-2698943",
            "CSAFPID-2698376",
            "CSAFPID-2698377",
            "CSAFPID-2698949",
            "CSAFPID-2698941",
            "CSAFPID-2698942",
            "CSAFPID-2699022",
            "CSAFPID-1839977",
            "CSAFPID-1840034",
            "CSAFPID-1840035",
            "CSAFPID-1144602",
            "CSAFPID-1238473",
            "CSAFPID-1145800",
            "CSAFPID-356315",
            "CSAFPID-1237753",
            "CSAFPID-1238475",
            "CSAFPID-1296375",
            "CSAFPID-356152",
            "CSAFPID-1237603",
            "CSAFPID-2699065",
            "CSAFPID-2699066",
            "CSAFPID-1840017",
            "CSAFPID-1840013",
            "CSAFPID-1145419",
            "CSAFPID-1145421",
            "CSAFPID-1145422",
            "CSAFPID-1145420",
            "CSAFPID-2699109",
            "CSAFPID-2699107",
            "CSAFPID-2699106",
            "CSAFPID-2699110",
            "CSAFPID-2698972",
            "CSAFPID-2699108",
            "CSAFPID-2698463",
            "CSAFPID-2698464",
            "CSAFPID-2698465",
            "CSAFPID-2698466",
            "CSAFPID-2698467",
            "CSAFPID-2698468"
          ]
        }
      ],
      "title": "CVE-2025-30736"
    }
  ]
}
  ncsc-2025-0020
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in diverse database producten en subsystemen, zoals de Core Database, Graal, Application Express, GoldenGate en REST data.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden bevinden zich in verschillende componenten van de Oracle Database, waaronder de Data Mining component en de Java VM. Deze kwetsbaarheden stellen laaggeprivilegieerde geauthenticeerde gebruikers in staat om het systeem te compromitteren, wat kan leiden tot ongeautoriseerde toegang en gegevensmanipulatie. De Java VM-kwetsbaarheid kan ook leiden tot ongeautoriseerde wijzigingen van gegevens.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Unchecked Error Condition",
        "title": "CWE-391"
      },
      {
        "category": "general",
        "text": "Misinterpretation of Input",
        "title": "CWE-115"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "Incorrect Calculation of Buffer Size",
        "title": "CWE-131"
      },
      {
        "category": "general",
        "text": "Improper Validation of Specified Type of Input",
        "title": "CWE-1287"
      },
      {
        "category": "general",
        "text": "Insecure Storage of Sensitive Information",
        "title": "CWE-922"
      },
      {
        "category": "general",
        "text": "Integer Underflow (Wrap or Wraparound)",
        "title": "CWE-191"
      },
      {
        "category": "general",
        "text": "Insufficient Granularity of Access Control",
        "title": "CWE-1220"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
        "title": "CWE-776"
      },
      {
        "category": "general",
        "text": "Improper Handling of Case Sensitivity",
        "title": "CWE-178"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Expected Behavior Violation",
        "title": "CWE-440"
      },
      {
        "category": "general",
        "text": "Improper Validation of Syntactic Correctness of Input",
        "title": "CWE-1286"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Reachable Assertion",
        "title": "CWE-617"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
        "title": "CWE-601"
      },
      {
        "category": "general",
        "text": "Authentication Bypass Using an Alternate Path or Channel",
        "title": "CWE-288"
      },
      {
        "category": "general",
        "text": "Improper Validation of Integrity Check Value",
        "title": "CWE-354"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
        "title": "CWE-1321"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
        "title": "CWE-757"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Incorrect Default Permissions",
        "title": "CWE-276"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Database producten",
    "tracking": {
      "current_release_date": "2025-01-22T13:30:16.354373Z",
      "id": "NCSC-2025-0020",
      "initial_release_date": "2025-01-22T13:30:16.354373Z",
      "revision_history": [
        {
          "date": "2025-01-22T13:30:16.354373Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "graal_development_kit_for_micronaut",
            "product": {
              "name": "graal_development_kit_for_micronaut",
              "product_id": "CSAFPID-1751216",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:graal_development_kit_for_micronaut:23.5-23.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_-_data_mining",
            "product": {
              "name": "database_-_data_mining",
              "product_id": "CSAFPID-1751200",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_-_data_mining:19.3-19.25:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_-_data_mining",
            "product": {
              "name": "database_-_data_mining",
              "product_id": "CSAFPID-1751199",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_-_data_mining:21.3-21.16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_migration_assistant_for_unicode",
            "product": {
              "name": "database_migration_assistant_for_unicode",
              "product_id": "CSAFPID-1751212",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_migration_assistant_for_unicode:19.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_server",
            "product": {
              "name": "database_server",
              "product_id": "CSAFPID-1503604",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_server:_java_vm___23.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_-_graalvm_multilingual_engine",
            "product": {
              "name": "database_-_graalvm_multilingual_engine",
              "product_id": "CSAFPID-1751223",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:21.4-21.16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "database_-_graalvm_multilingual_engine",
            "product": {
              "name": "database_-_graalvm_multilingual_engine",
              "product_id": "CSAFPID-1751224",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:database_-_graalvm_multilingual_engine:23.5-23.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "application_express",
            "product": {
              "name": "application_express",
              "product_id": "CSAFPID-1503575",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:application_express:23.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "application_express",
            "product": {
              "name": "application_express",
              "product_id": "CSAFPID-1673188",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:application_express:24.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-342816",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate_big_data_and_application_adapters",
            "product": {
              "name": "goldengate_big_data_and_application_adapters",
              "product_id": "CSAFPID-816845",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate_big_data_and_application_adapters",
            "product": {
              "name": "goldengate_big_data_and_application_adapters",
              "product_id": "CSAFPID-1650825",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:19.1.0.0.0-19.1.0.0.18:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate_big_data_and_application_adapters",
            "product": {
              "name": "goldengate_big_data_and_application_adapters",
              "product_id": "CSAFPID-1751298",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:21.3.0.0.0-21.16.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate_big_data_and_application_adapters",
            "product": {
              "name": "goldengate_big_data_and_application_adapters",
              "product_id": "CSAFPID-1751299",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate_big_data_and_application_adapters:23.4-23.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1650767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0-19.23.0.0.240716:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-485902",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:19.1.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1503736",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:19.23.0.0.240716:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1503739",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:21.14:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1751093",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:21.16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1751094",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:23.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1751095",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:23.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1751204",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:23.4-23.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1503738",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:21.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1751203",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.16:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "goldengate",
            "product": {
              "name": "goldengate",
              "product_id": "CSAFPID-1650765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:goldengate:21.3-21.14:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "rest_data_services",
            "product": {
              "name": "rest_data_services",
              "product_id": "CSAFPID-711746",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:rest_data_services:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "rest_data_services",
            "product": {
              "name": "rest_data_services",
              "product_id": "CSAFPID-1751305",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:rest_data_services:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "rest_data_services",
            "product": {
              "name": "rest_data_services",
              "product_id": "CSAFPID-1751304",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:rest_data_services:24.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "secure_backup",
            "product": {
              "name": "secure_backup",
              "product_id": "CSAFPID-667692",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "secure_backup",
            "product": {
              "name": "secure_backup",
              "product_id": "CSAFPID-345049",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "secure_backup",
            "product": {
              "name": "secure_backup",
              "product_id": "CSAFPID-611417",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:secure_backup:18.1.0.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "secure_backup",
            "product": {
              "name": "secure_backup",
              "product_id": "CSAFPID-1673422",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:secure_backup:19.1.0.0.0:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-38998",
      "cwe": {
        "id": "CWE-1321",
        "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
          "title": "CWE-1321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503575",
          "CSAFPID-1673188",
          "CSAFPID-1751204",
          "CSAFPID-1751203"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38998",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1503575",
            "CSAFPID-1673188",
            "CSAFPID-1751204",
            "CSAFPID-1751203"
          ]
        }
      ],
      "title": "CVE-2024-38998"
    },
    {
      "cve": "CVE-2024-38999",
      "cwe": {
        "id": "CWE-1321",
        "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
          "title": "CWE-1321"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503575",
          "CSAFPID-1673188",
          "CSAFPID-1751204",
          "CSAFPID-1751203"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38999",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 10.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1503575",
            "CSAFPID-1673188",
            "CSAFPID-1751204",
            "CSAFPID-1751203"
          ]
        }
      ],
      "title": "CVE-2024-38999"
    },
    {
      "cve": "CVE-2024-45490",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        },
        {
          "category": "other",
          "text": "Incorrect Calculation of Buffer Size",
          "title": "CWE-131"
        },
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45490",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
        }
      ],
      "title": "CVE-2024-45490"
    },
    {
      "cve": "CVE-2024-45491",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45491",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
        }
      ],
      "title": "CVE-2024-45491"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
        }
      ],
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-45772",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45772",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45772.json"
        }
      ],
      "title": "CVE-2024-45772"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-47561",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650825",
          "CSAFPID-1751298",
          "CSAFPID-1751299"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650825",
            "CSAFPID-1751298",
            "CSAFPID-1751299"
          ]
        }
      ],
      "title": "CVE-2024-47561"
    },
    {
      "cve": "CVE-2024-50379",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50379",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
        }
      ],
      "title": "CVE-2024-50379"
    },
    {
      "cve": "CVE-2024-52316",
      "cwe": {
        "id": "CWE-391",
        "name": "Unchecked Error Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Error Condition",
          "title": "CWE-391"
        },
        {
          "category": "other",
          "text": "Authentication Bypass Using an Alternate Path or Channel",
          "title": "CWE-288"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52316",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52316.json"
        }
      ],
      "title": "CVE-2024-52316"
    },
    {
      "cve": "CVE-2024-54677",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-54677",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
        }
      ],
      "title": "CVE-2024-54677"
    },
    {
      "cve": "CVE-2024-56337",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56337",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
        }
      ],
      "title": "CVE-2024-56337"
    },
    {
      "cve": "CVE-2025-21553",
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21553",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21553.json"
        }
      ],
      "title": "CVE-2025-21553"
    },
    {
      "cve": "CVE-2025-21557",
      "product_status": {
        "known_affected": [
          "CSAFPID-1503575",
          "CSAFPID-1673188"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21557",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21557.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1503575",
            "CSAFPID-1673188"
          ]
        }
      ],
      "title": "CVE-2025-21557"
    },
    {
      "cve": "CVE-2022-26345",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751199",
          "CSAFPID-1751200"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-26345",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-26345.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751199",
            "CSAFPID-1751200"
          ]
        }
      ],
      "title": "CVE-2022-26345"
    },
    {
      "cve": "CVE-2023-27043",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-27043",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json"
        }
      ],
      "title": "CVE-2023-27043"
    },
    {
      "cve": "CVE-2023-36730",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751203",
          "CSAFPID-1751204"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-36730",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36730.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751203",
            "CSAFPID-1751204"
          ]
        }
      ],
      "title": "CVE-2023-36730"
    },
    {
      "cve": "CVE-2023-36785",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Underflow (Wrap or Wraparound)",
          "title": "CWE-191"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751203",
          "CSAFPID-1751204"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-36785",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-36785.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751203",
            "CSAFPID-1751204"
          ]
        }
      ],
      "title": "CVE-2023-36785"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        },
        {
          "category": "other",
          "text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
          "title": "CWE-757"
        },
        {
          "category": "other",
          "text": "Improper Validation of Integrity Check Value",
          "title": "CWE-354"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650765",
          "CSAFPID-1650767",
          "CSAFPID-342816",
          "CSAFPID-667692",
          "CSAFPID-711746",
          "CSAFPID-816845",
          "CSAFPID-1503575",
          "CSAFPID-1503604",
          "CSAFPID-1751212"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650765",
            "CSAFPID-1650767",
            "CSAFPID-342816",
            "CSAFPID-667692",
            "CSAFPID-711746",
            "CSAFPID-816845",
            "CSAFPID-1503575",
            "CSAFPID-1503604",
            "CSAFPID-1751212"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-52428",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-342816",
          "CSAFPID-1503575",
          "CSAFPID-1503604",
          "CSAFPID-816845",
          "CSAFPID-711746",
          "CSAFPID-1751216"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52428",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-342816",
            "CSAFPID-1503575",
            "CSAFPID-1503604",
            "CSAFPID-816845",
            "CSAFPID-711746",
            "CSAFPID-1751216"
          ]
        }
      ],
      "title": "CVE-2023-52428"
    },
    {
      "cve": "CVE-2024-2961",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503575",
          "CSAFPID-1503604",
          "CSAFPID-342816",
          "CSAFPID-816845",
          "CSAFPID-711746"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2961",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1503575",
            "CSAFPID-1503604",
            "CSAFPID-342816",
            "CSAFPID-816845",
            "CSAFPID-711746"
          ]
        }
      ],
      "title": "CVE-2024-2961"
    },
    {
      "cve": "CVE-2024-4030",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Default Permissions",
          "title": "CWE-276"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4030",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
        }
      ],
      "title": "CVE-2024-4030"
    },
    {
      "cve": "CVE-2024-4032",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Expected Behavior Violation",
          "title": "CWE-440"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4032",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
        }
      ],
      "title": "CVE-2024-4032"
    },
    {
      "cve": "CVE-2024-6232",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6232",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
        }
      ],
      "title": "CVE-2024-6232"
    },
    {
      "cve": "CVE-2024-6763",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Syntactic Correctness of Input",
          "title": "CWE-1286"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751304",
          "CSAFPID-1751305"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6763",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751304",
            "CSAFPID-1751305"
          ]
        }
      ],
      "title": "CVE-2024-6763"
    },
    {
      "cve": "CVE-2024-6923",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6923",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6923.json"
        }
      ],
      "title": "CVE-2024-6923"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-7592",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7592",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
        }
      ],
      "title": "CVE-2024-7592"
    },
    {
      "cve": "CVE-2024-8088",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-8088",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8088.json"
        }
      ],
      "title": "CVE-2024-8088"
    },
    {
      "cve": "CVE-2024-8927",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Insufficient Granularity of Access Control",
          "title": "CWE-1220"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673422",
          "CSAFPID-345049",
          "CSAFPID-611417"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-8927",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8927.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673422",
            "CSAFPID-345049",
            "CSAFPID-611417"
          ]
        }
      ],
      "title": "CVE-2024-8927"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-21211",
      "cwe": {
        "id": "CWE-922",
        "name": "Insecure Storage of Sensitive Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insecure Storage of Sensitive Information",
          "title": "CWE-922"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751223",
          "CSAFPID-1751224"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21211",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21211.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751223",
            "CSAFPID-1751224"
          ]
        }
      ],
      "title": "CVE-2024-21211"
    },
    {
      "cve": "CVE-2024-22262",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
          "title": "CWE-601"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650825",
          "CSAFPID-1503575",
          "CSAFPID-1503604",
          "CSAFPID-342816",
          "CSAFPID-816845",
          "CSAFPID-711746"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22262",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650825",
            "CSAFPID-1503575",
            "CSAFPID-1503604",
            "CSAFPID-342816",
            "CSAFPID-816845",
            "CSAFPID-711746"
          ]
        }
      ],
      "title": "CVE-2024-22262"
    },
    {
      "cve": "CVE-2024-24789",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Validation of Specified Type of Input",
          "title": "CWE-1287"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24789",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24789.json"
        }
      ],
      "title": "CVE-2024-24789"
    },
    {
      "cve": "CVE-2024-24790",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Misinterpretation of Input",
          "title": "CWE-115"
        },
        {
          "category": "other",
          "text": "Improper Validation of Specified Type of Input",
          "title": "CWE-1287"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24790",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24790.json"
        }
      ],
      "title": "CVE-2024-24790"
    },
    {
      "cve": "CVE-2024-24791",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24791",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
        }
      ],
      "title": "CVE-2024-24791"
    },
    {
      "cve": "CVE-2024-28757",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
          "title": "CWE-776"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503575",
          "CSAFPID-1503604",
          "CSAFPID-342816",
          "CSAFPID-816845",
          "CSAFPID-711746"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28757",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28757.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1503575",
            "CSAFPID-1503604",
            "CSAFPID-342816",
            "CSAFPID-816845",
            "CSAFPID-711746"
          ]
        }
      ],
      "title": "CVE-2024-28757"
    },
    {
      "cve": "CVE-2024-33599",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33599",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
        }
      ],
      "title": "CVE-2024-33599"
    },
    {
      "cve": "CVE-2024-33600",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33600",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
        }
      ],
      "title": "CVE-2024-33600"
    },
    {
      "cve": "CVE-2024-33601",
      "cwe": {
        "id": "CWE-703",
        "name": "Improper Check or Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        },
        {
          "category": "other",
          "text": "Reachable Assertion",
          "title": "CWE-617"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
        }
      ],
      "title": "CVE-2024-33601"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-38819",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650825"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38819",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650825"
          ]
        }
      ],
      "title": "CVE-2024-38819"
    },
    {
      "cve": "CVE-2024-38820",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        },
        {
          "category": "other",
          "text": "Improper Handling of Case Sensitivity",
          "title": "CWE-178"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650825"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38820",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650825"
          ]
        }
      ],
      "title": "CVE-2024-38820"
    }
  ]
}
  ncsc-2025-0024
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in Oracle MySQL.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen een kwaadwillende in staat om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van een beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n\n",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Always-Incorrect Control Flow Implementation",
        "title": "CWE-670"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle MySQL",
    "tracking": {
      "current_release_date": "2025-01-22T13:32:27.142159Z",
      "id": "NCSC-2025-0024",
      "initial_release_date": "2025-01-22T13:32:27.142159Z",
      "revision_history": [
        {
          "date": "2025-01-22T13:32:27.142159Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "mysql",
            "product": {
              "name": "mysql",
              "product_id": "CSAFPID-249429",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql",
            "product": {
              "name": "mysql",
              "product_id": "CSAFPID-1506681",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___7.5.35",
            "product": {
              "name": "mysql___7.5.35",
              "product_id": "CSAFPID-1674684",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___7.5.35:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___7.6.31",
            "product": {
              "name": "mysql___7.6.31",
              "product_id": "CSAFPID-1674685",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___7.6.31:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___8.0.35",
            "product": {
              "name": "mysql___8.0.35",
              "product_id": "CSAFPID-1617768",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___8.0.35:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___8.0.38",
            "product": {
              "name": "mysql___8.0.38",
              "product_id": "CSAFPID-1617874",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___8.0.38:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___8.0.39",
            "product": {
              "name": "mysql___8.0.39",
              "product_id": "CSAFPID-1674686",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___8.0.39:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___8.4.1",
            "product": {
              "name": "mysql___8.4.1",
              "product_id": "CSAFPID-1674682",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___8.4.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___8.4.2",
            "product": {
              "name": "mysql___8.4.2",
              "product_id": "CSAFPID-1674687",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___8.4.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___9.0.0",
            "product": {
              "name": "mysql___9.0.0",
              "product_id": "CSAFPID-1674688",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___9.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql___9.0.1",
            "product": {
              "name": "mysql___9.0.1",
              "product_id": "CSAFPID-1674683",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql___9.0.1:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1751129",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:7.6.32_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1673433",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.39_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1751130",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.40_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1673432",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.2_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1751131",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.3_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1673434",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:9.0.1_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_cluster",
            "product": {
              "name": "mysql_cluster",
              "product_id": "CSAFPID-1751132",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_cluster:9.1.0_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_connector\\/python",
            "product": {
              "name": "mysql_connector\\/python",
              "product_id": "CSAFPID-1751151",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_connector\\/python:9.1.0_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_backup",
            "product": {
              "name": "mysql_enterprise_backup",
              "product_id": "CSAFPID-1751221",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.40_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_backup",
            "product": {
              "name": "mysql_enterprise_backup",
              "product_id": "CSAFPID-1751219",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.4.3_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_backup",
            "product": {
              "name": "mysql_enterprise_backup",
              "product_id": "CSAFPID-1751220",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.1.0_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_firewall",
            "product": {
              "name": "mysql_enterprise_firewall",
              "product_id": "CSAFPID-1751124",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.0.40_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_firewall",
            "product": {
              "name": "mysql_enterprise_firewall",
              "product_id": "CSAFPID-1751125",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:8.4.3_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_enterprise_firewall",
            "product": {
              "name": "mysql_enterprise_firewall",
              "product_id": "CSAFPID-1751126",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_enterprise_firewall:9.1.0_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1650794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1673429",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1751119",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.0.40_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1673179",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1673428",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1751120",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:8.4.3_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1673430",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "mysql_server",
            "product": {
              "name": "mysql_server",
              "product_id": "CSAFPID-1751121",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:mysql_server:9.1.0_and_prior:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-37519",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673428",
          "CSAFPID-1751119"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-37519",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37519.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673428",
            "CSAFPID-1751119"
          ]
        }
      ],
      "title": "CVE-2021-37519"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1751219",
          "CSAFPID-1751119",
          "CSAFPID-1751220",
          "CSAFPID-1751121",
          "CSAFPID-1751120",
          "CSAFPID-1751221",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751219",
            "CSAFPID-1751119",
            "CSAFPID-1751220",
            "CSAFPID-1751121",
            "CSAFPID-1751120",
            "CSAFPID-1751221",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-35195",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Always-Incorrect Control Flow Implementation",
          "title": "CWE-670"
        }
      ],
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-35195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
        }
      ],
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-37370",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673432",
          "CSAFPID-1673433",
          "CSAFPID-1673434",
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37370",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673432",
            "CSAFPID-1673433",
            "CSAFPID-1673434",
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430"
          ]
        }
      ],
      "title": "CVE-2024-37370"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673432",
          "CSAFPID-1673433",
          "CSAFPID-1673434",
          "CSAFPID-1506681",
          "CSAFPID-1674682",
          "CSAFPID-1674683",
          "CSAFPID-1674684",
          "CSAFPID-1674685",
          "CSAFPID-1617768",
          "CSAFPID-1674686",
          "CSAFPID-1674687",
          "CSAFPID-1674688",
          "CSAFPID-1617874",
          "CSAFPID-249429",
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673432",
            "CSAFPID-1673433",
            "CSAFPID-1673434",
            "CSAFPID-1506681",
            "CSAFPID-1674682",
            "CSAFPID-1674683",
            "CSAFPID-1674684",
            "CSAFPID-1674685",
            "CSAFPID-1617768",
            "CSAFPID-1674686",
            "CSAFPID-1674687",
            "CSAFPID-1674688",
            "CSAFPID-1617874",
            "CSAFPID-249429",
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2025-21490",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21490",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21490.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21490"
    },
    {
      "cve": "CVE-2025-21491",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21491",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21491.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21491"
    },
    {
      "cve": "CVE-2025-21492",
      "product_status": {
        "known_affected": [
          "CSAFPID-1650794",
          "CSAFPID-1673179",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650794",
            "CSAFPID-1673179",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21492"
    },
    {
      "cve": "CVE-2025-21493",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21493",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21493.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21493"
    },
    {
      "cve": "CVE-2025-21494",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21494",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21494.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21494"
    },
    {
      "cve": "CVE-2025-21495",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751124",
          "CSAFPID-1751125",
          "CSAFPID-1751126",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21495",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21495.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751124",
            "CSAFPID-1751125",
            "CSAFPID-1751126",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21495"
    },
    {
      "cve": "CVE-2025-21497",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21497",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21497.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21497"
    },
    {
      "cve": "CVE-2025-21499",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21499",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21499.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21499"
    },
    {
      "cve": "CVE-2025-21500",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21500",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21500.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21500"
    },
    {
      "cve": "CVE-2025-21501",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21501",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21501.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21501"
    },
    {
      "cve": "CVE-2025-21503",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21503",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21503.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21503"
    },
    {
      "cve": "CVE-2025-21504",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21504",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21504.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21504"
    },
    {
      "cve": "CVE-2025-21505",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21505",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21505.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21505"
    },
    {
      "cve": "CVE-2025-21518",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751129",
          "CSAFPID-1751130",
          "CSAFPID-1751131",
          "CSAFPID-1751132",
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21518",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21518.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751129",
            "CSAFPID-1751130",
            "CSAFPID-1751131",
            "CSAFPID-1751132",
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21518"
    },
    {
      "cve": "CVE-2025-21519",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21519",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21519.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21519"
    },
    {
      "cve": "CVE-2025-21520",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751129",
          "CSAFPID-1751130",
          "CSAFPID-1751131",
          "CSAFPID-1751132",
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21520",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21520.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 1.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751129",
            "CSAFPID-1751130",
            "CSAFPID-1751131",
            "CSAFPID-1751132",
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21520"
    },
    {
      "cve": "CVE-2025-21521",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21521",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21521.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21521"
    },
    {
      "cve": "CVE-2025-21522",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21522",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21522.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21522"
    },
    {
      "cve": "CVE-2025-21523",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21523",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21523.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21523"
    },
    {
      "cve": "CVE-2025-21525",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21525",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21525.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21525"
    },
    {
      "cve": "CVE-2025-21529",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21529",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21529.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21529"
    },
    {
      "cve": "CVE-2025-21531",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751129",
          "CSAFPID-1751130",
          "CSAFPID-1751131",
          "CSAFPID-1751132",
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21531",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21531.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751129",
            "CSAFPID-1751130",
            "CSAFPID-1751131",
            "CSAFPID-1751132",
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21531"
    },
    {
      "cve": "CVE-2025-21534",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21534",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21534.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21534"
    },
    {
      "cve": "CVE-2025-21536",
      "product_status": {
        "known_affected": [
          "CSAFPID-1673429",
          "CSAFPID-1673428",
          "CSAFPID-1673430",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21536",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21536.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673429",
            "CSAFPID-1673428",
            "CSAFPID-1673430",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21536"
    },
    {
      "cve": "CVE-2025-21540",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21540",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21540.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21540"
    },
    {
      "cve": "CVE-2025-21543",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751129",
          "CSAFPID-1751130",
          "CSAFPID-1751131",
          "CSAFPID-1751132",
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21543",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21543.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751129",
            "CSAFPID-1751130",
            "CSAFPID-1751131",
            "CSAFPID-1751132",
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21543"
    },
    {
      "cve": "CVE-2025-21546",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21546",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21546.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21546"
    },
    {
      "cve": "CVE-2025-21548",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751151",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21548",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21548.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751151",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21548"
    },
    {
      "cve": "CVE-2025-21555",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21555",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21555.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21555"
    },
    {
      "cve": "CVE-2025-21559",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751119",
          "CSAFPID-1751120",
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21559",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21559.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751119",
            "CSAFPID-1751120",
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21559"
    },
    {
      "cve": "CVE-2025-21566",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21566",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21566.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21566"
    },
    {
      "cve": "CVE-2025-21567",
      "product_status": {
        "known_affected": [
          "CSAFPID-1751121",
          "CSAFPID-1506681",
          "CSAFPID-249429"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-21567",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21567.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1751121",
            "CSAFPID-1506681",
            "CSAFPID-249429"
          ]
        }
      ],
      "title": "CVE-2025-21567"
    }
  ]
}
  ncsc-2025-0128
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft meerdere kwetsbaarheden verholpen in verschillende producten, waaronder de Utilities Application Framework, WebLogic Server, en Fusion Middleware.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om toegang te krijgen tot kritieke gegevens, Denial-of-Service (DoS) te veroorzaken, en in sommige gevallen zelfs volledige controle over systemen te verkrijgen. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal vervaardigde verzoeken te sturen of door gebruik te maken van onveilige configuraties in de getroffen producten.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements Used in a Template Engine",
        "title": "CWE-1336"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Inclusion of Functionality from Untrusted Control Sphere",
        "title": "CWE-829"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Fusion Middleware",
    "tracking": {
      "current_release_date": "2025-04-16T15:01:24.587426Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0128",
      "initial_release_date": "2025-04-16T15:01:24.587426Z",
      "revision_history": [
        {
          "date": "2025-04-16T15:01:24.587426Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-2699078",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:access_manager:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Access Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1839842",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:business_process_management_suite:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2698989",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:business_process_management_suite:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Business Process Management Suite"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1839864",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2698967",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:http_server:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle HTTP Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1839938",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:managed_file_transfer:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2699074",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:managed_file_transfer:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Managed File Transfer"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-2698998",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:soa_suite:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2698997",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:soa_suite:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle SOA Suite"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1839896",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.1.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.1.0.0",
                      "product_id": "CSAFPID-1839897",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-1840030",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle WebLogic Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.5.7",
                    "product": {
                      "name": "vers:oracle/8.5.7",
                      "product_id": "CSAFPID-1839872",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:outside_in_technology:8.5.7:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Outside In Technology"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1840014",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.1.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.1.0.0",
                      "product_id": "CSAFPID-1839982",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2699125",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:coherence:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Coherence"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1839988",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:fusion_middleware_mapviewer:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Fusion Middleware MapViewer"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-2698948",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:jdeveloper:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle JDeveloper"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.1.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.1.0.0",
                      "product_id": "CSAFPID-2699057",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:webcenter_forms_recognition:14.1.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle WebCenter Forms Recognition"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1840006",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle WebCenter Portal"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-2698985",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Data Integrator"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-1840028",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.1.2.0.0",
                    "product": {
                      "name": "vers:oracle/14.1.2.0.0",
                      "product_id": "CSAFPID-2699064",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:business_activity_monitoring:14.1.2.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Business Activity Monitoring"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.2.1.4.0",
                    "product": {
                      "name": "vers:oracle/12.2.1.4.0",
                      "product_id": "CSAFPID-2699044",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:service_bus:12.2.1.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Service Bus"
              }
            ],
            "category": "product_family",
            "name": "Oracle Fusion Middleware"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1213401"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Managed File Transfer"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.3.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.3.0",
                      "product_id": "CSAFPID-1536644"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1536288"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/14.1.1.0.0",
                    "product": {
                      "name": "vers:unknown/14.1.1.0.0",
                      "product_id": "CSAFPID-1536278"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Weblogic Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/8.5.7",
                    "product": {
                      "name": "vers:unknown/8.5.7",
                      "product_id": "CSAFPID-1233360"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Outside In Technology"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1210435"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/14.1.1.0.0",
                    "product": {
                      "name": "vers:unknown/14.1.1.0.0",
                      "product_id": "CSAFPID-1210304"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Coherence"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1247956"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Jdeveloper (Application)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.3.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.3.0",
                      "product_id": "CSAFPID-1214253"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1232894"
                    }
                  }
                ],
                "category": "product_name",
                "name": "WebCenter Portal"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/12.2.1.4.0",
                    "product": {
                      "name": "vers:unknown/12.2.1.4.0",
                      "product_id": "CSAFPID-1201529"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Data Integrator"
              }
            ],
            "category": "product_family",
            "name": "Oracle"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/12.2.1.4.0",
                "product": {
                  "name": "vers:oracle/12.2.1.4.0",
                  "product_id": "CSAFPID-1144680",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/14.1.1.0.0",
                "product": {
                  "name": "vers:oracle/14.1.1.0.0",
                  "product_id": "CSAFPID-1144604",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle WebLogic Server"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/12.2.1.4.0",
                "product": {
                  "name": "vers:unknown/12.2.1.4.0",
                  "product_id": "CSAFPID-39413",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/14.1.1.0.0",
                "product": {
                  "name": "vers:unknown/14.1.1.0.0",
                  "product_id": "CSAFPID-39412",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:coherence:14.1.1.0.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Coherence"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/12.2.1.3.0",
                "product": {
                  "name": "vers:oracle/12.2.1.3.0",
                  "product_id": "CSAFPID-1144910"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/12.2.1.4.0",
                "product": {
                  "name": "vers:oracle/12.2.1.4.0",
                  "product_id": "CSAFPID-1144911",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle WebCenter Portal"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:unknown/12.2.1.3.0",
                "product": {
                  "name": "vers:unknown/12.2.1.3.0",
                  "product_id": "CSAFPID-317201",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:unknown/12.2.1.4.0",
                "product": {
                  "name": "vers:unknown/12.2.1.4.0",
                  "product_id": "CSAFPID-307786",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:ibm:oracle_webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "WebCenter Portal"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-13936",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements Used in a Template Engine",
          "title": "CWE-1336"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-13936",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13936.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2020-13936"
    },
    {
      "cve": "CVE-2020-25649",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2020-25649",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-25649.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2020-25649"
    },
    {
      "cve": "CVE-2023-26464",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-26464",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-26464.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2023-26464"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-9143",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-9143",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
        }
      ],
      "title": "CVE-2024-9143"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-11612",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11612",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11612.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-11612"
    },
    {
      "cve": "CVE-2024-25710",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25710",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-25710"
    },
    {
      "cve": "CVE-2024-28168",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28168",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-28168"
    },
    {
      "cve": "CVE-2024-29857",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29857",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-29857"
    },
    {
      "cve": "CVE-2024-38476",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Inclusion of Functionality from Untrusted Control Sphere",
          "title": "CWE-829"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38476",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38476.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-38476"
    },
    {
      "cve": "CVE-2024-40896",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40896",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-40896"
    },
    {
      "cve": "CVE-2024-47072",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47072",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-47072"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-47561",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47561",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-47561"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-52046",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52046",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-52046"
    },
    {
      "cve": "CVE-2024-56337",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56337",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2024-56337"
    },
    {
      "cve": "CVE-2025-23184",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-23184",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
        }
      ],
      "title": "CVE-2025-23184"
    },
    {
      "cve": "CVE-2025-24970",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24970",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2025-24970"
    },
    {
      "cve": "CVE-2025-27363",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-2699078",
          "CSAFPID-1839842",
          "CSAFPID-2698989",
          "CSAFPID-1839864",
          "CSAFPID-2698967",
          "CSAFPID-1213401",
          "CSAFPID-1839938",
          "CSAFPID-2699074",
          "CSAFPID-2698998",
          "CSAFPID-2698997",
          "CSAFPID-1144680",
          "CSAFPID-1839896",
          "CSAFPID-1144604",
          "CSAFPID-1839897",
          "CSAFPID-1536644",
          "CSAFPID-1840030",
          "CSAFPID-1536288",
          "CSAFPID-1536278",
          "CSAFPID-1839872",
          "CSAFPID-1233360",
          "CSAFPID-39413",
          "CSAFPID-1210435",
          "CSAFPID-1210304",
          "CSAFPID-39412",
          "CSAFPID-1840014",
          "CSAFPID-1839982",
          "CSAFPID-2699125",
          "CSAFPID-1839988",
          "CSAFPID-1247956",
          "CSAFPID-2698948",
          "CSAFPID-2699057",
          "CSAFPID-1144910",
          "CSAFPID-1840006",
          "CSAFPID-1144911",
          "CSAFPID-1214253",
          "CSAFPID-317201",
          "CSAFPID-1232894",
          "CSAFPID-307786",
          "CSAFPID-1201529",
          "CSAFPID-2698985",
          "CSAFPID-1840028",
          "CSAFPID-2699064",
          "CSAFPID-2699044"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27363",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27363.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-2699078",
            "CSAFPID-1839842",
            "CSAFPID-2698989",
            "CSAFPID-1839864",
            "CSAFPID-2698967",
            "CSAFPID-1213401",
            "CSAFPID-1839938",
            "CSAFPID-2699074",
            "CSAFPID-2698998",
            "CSAFPID-2698997",
            "CSAFPID-1144680",
            "CSAFPID-1839896",
            "CSAFPID-1144604",
            "CSAFPID-1839897",
            "CSAFPID-1536644",
            "CSAFPID-1840030",
            "CSAFPID-1536288",
            "CSAFPID-1536278",
            "CSAFPID-1839872",
            "CSAFPID-1233360",
            "CSAFPID-39413",
            "CSAFPID-1210435",
            "CSAFPID-1210304",
            "CSAFPID-39412",
            "CSAFPID-1840014",
            "CSAFPID-1839982",
            "CSAFPID-2699125",
            "CSAFPID-1839988",
            "CSAFPID-1247956",
            "CSAFPID-2698948",
            "CSAFPID-2699057",
            "CSAFPID-1144910",
            "CSAFPID-1840006",
            "CSAFPID-1144911",
            "CSAFPID-1214253",
            "CSAFPID-317201",
            "CSAFPID-1232894",
            "CSAFPID-307786",
            "CSAFPID-1201529",
            "CSAFPID-2698985",
            "CSAFPID-1840028",
            "CSAFPID-2699064",
            "CSAFPID-2699044"
          ]
        }
      ],
      "title": "CVE-2025-27363"
    }
  ]
}
  ncsc-2025-0124
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft meerdere kwetsbaarheden verholpen in Oracle Communications producten, waaronder de Cloud Native Core en Policy Management.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "De kwetsbaarheden in Oracle Communications producten stellen ongeauthenticeerde aanvallers in staat om ongeautoriseerde toegang te verkrijgen tot gevoelige gegevens en kunnen leiden tot Denial-of-Service (DoS) aanvallen. Specifieke versies van de Cloud Native Core, zoals de Binding Support Function en Network Repository Function, zijn getroffen, met CVSS-scores die vari\u00ebren van 4.3 tot 9.8, wat wijst op significante risico\u0027s voor de beschikbaarheid en vertrouwelijkheid van de systemen.",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
        "title": "CWE-44"
      },
      {
        "category": "general",
        "text": "Use of Incorrectly-Resolved Name or Reference",
        "title": "CWE-706"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
        "title": "CWE-1321"
      },
      {
        "category": "general",
        "text": "Deserialization of Untrusted Data",
        "title": "CWE-502"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Stack-based Buffer Overflow",
        "title": "CWE-121"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
        "title": "CWE-79"
      },
      {
        "category": "general",
        "text": "Dependency on Vulnerable Third-Party Component",
        "title": "CWE-1395"
      },
      {
        "category": "general",
        "text": "Improper Isolation or Compartmentalization",
        "title": "CWE-653"
      },
      {
        "category": "general",
        "text": "Always-Incorrect Control Flow Implementation",
        "title": "CWE-670"
      },
      {
        "category": "general",
        "text": "Use of Potentially Dangerous Function",
        "title": "CWE-676"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements Used in a Template Engine",
        "title": "CWE-1336"
      },
      {
        "category": "general",
        "text": "Missing Report of Error Condition",
        "title": "CWE-392"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Observable Timing Discrepancy",
        "title": "CWE-208"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Incorrect Implementation of Authentication Algorithm",
        "title": "CWE-303"
      },
      {
        "category": "general",
        "text": "Incorrect Permission Assignment for Critical Resource",
        "title": "CWE-732"
      },
      {
        "category": "general",
        "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
        "title": "CWE-367"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
        "title": "CWE-917"
      },
      {
        "category": "general",
        "text": "Improper Validation of Syntactic Correctness of Input",
        "title": "CWE-1286"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Integer Overflow to Buffer Overflow",
        "title": "CWE-680"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Divide By Zero",
        "title": "CWE-369"
      },
      {
        "category": "general",
        "text": "Files or Directories Accessible to External Parties",
        "title": "CWE-552"
      },
      {
        "category": "general",
        "text": "Authorization Bypass Through User-Controlled Key",
        "title": "CWE-639"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Missing Authorization",
        "title": "CWE-862"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Inefficient Regular Expression Complexity",
        "title": "CWE-1333"
      },
      {
        "category": "general",
        "text": "Improper Certificate Validation",
        "title": "CWE-295"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Use of a Broken or Risky Cryptographic Algorithm",
        "title": "CWE-327"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Improper Restriction of XML External Entity Reference",
        "title": "CWE-611"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      },
      {
        "category": "general",
        "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
        "title": "CWE-120"
      },
      {
        "category": "general",
        "text": "Improper Privilege Management",
        "title": "CWE-269"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; nvd; oracle",
        "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Communications",
    "tracking": {
      "current_release_date": "2025-04-16T08:39:55.217751Z",
      "generator": {
        "date": "2025-02-25T15:15:00Z",
        "engine": {
          "name": "V.A.",
          "version": "1.0"
        }
      },
      "id": "NCSC-2025-0124",
      "initial_release_date": "2025-04-16T08:39:55.217751Z",
      "revision_history": [
        {
          "date": "2025-04-16T08:39:55.217751Z",
          "number": "1.0.0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838578"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-1838586"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Binding Support Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:unknown/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-1838591"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Policy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838592"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Console"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-1838572"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.1",
                    "product": {
                      "name": "vers:unknown/24.2.1",
                      "product_id": "CSAFPID-1838581"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.2",
                    "product": {
                      "name": "vers:unknown/24.2.2",
                      "product_id": "CSAFPID-1838584"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Security Edge Protection Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=6.0|\u003c=6.1",
                    "product": {
                      "name": "vers:unknown/\u003e=6.0|\u003c=6.1",
                      "product_id": "CSAFPID-2698355"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Unified Assurance"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.3.0",
                    "product": {
                      "name": "vers:unknown/24.3.0",
                      "product_id": "CSAFPID-2698333"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Management Cloud Engine"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.0",
                    "product": {
                      "name": "vers:unknown/24.2.0",
                      "product_id": "CSAFPID-2698334"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Network Data Analytics Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.5",
                    "product": {
                      "name": "vers:unknown/24.2.5",
                      "product_id": "CSAFPID-2698374"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Network Function Cloud Native Environment"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.0",
                    "product": {
                      "name": "vers:unknown/9.0.0",
                      "product_id": "CSAFPID-1234193"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.1",
                    "product": {
                      "name": "vers:unknown/9.0.1",
                      "product_id": "CSAFPID-1234261"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.2",
                    "product": {
                      "name": "vers:unknown/9.0.2",
                      "product_id": "CSAFPID-2698362"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.0.3",
                    "product": {
                      "name": "vers:unknown/9.0.3",
                      "product_id": "CSAFPID-2698358"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2698372"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Element Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/15.0.0.0.0",
                    "product": {
                      "name": "vers:unknown/15.0.0.0.0",
                      "product_id": "CSAFPID-1837923"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Policy Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:unknown/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2698373"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Session Report Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.1.1.9",
                    "product": {
                      "name": "vers:unknown/9.1.1.9",
                      "product_id": "CSAFPID-2698357"
                    }
                  }
                ],
                "category": "product_name",
                "name": "SD-WAN Edge"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.2.3",
                    "product": {
                      "name": "vers:unknown/24.2.3",
                      "product_id": "CSAFPID-1838579"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/24.3.0",
                    "product": {
                      "name": "vers:unknown/24.3.0",
                      "product_id": "CSAFPID-1838582"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Cloud Native Core Unified Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/10.0.0",
                    "product": {
                      "name": "vers:unknown/10.0.0",
                      "product_id": "CSAFPID-2698381"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.2.0",
                    "product": {
                      "name": "vers:unknown/9.2.0",
                      "product_id": "CSAFPID-1207518"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/9.3.0",
                    "product": {
                      "name": "vers:unknown/9.3.0",
                      "product_id": "CSAFPID-1207704"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Communications Session Border Controller"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/4.1.0",
                    "product": {
                      "name": "vers:unknown/4.1.0",
                      "product_id": "CSAFPID-1207607"
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:unknown/4.2.0",
                    "product": {
                      "name": "vers:unknown/4.2.0",
                      "product_id": "CSAFPID-1207752"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Enterprise Communications Broker"
              }
            ],
            "category": "product_family",
            "name": "Oracle"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839911",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839908",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-2698963",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0-24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Binding Support Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698973",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.4",
                    "product": {
                      "name": "vers:oracle/24.2.4",
                      "product_id": "CSAFPID-2699085",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839941",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core DBTier"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.2",
                      "product_id": "CSAFPID-1839907",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.0|\u003c=24.2.4",
                      "product_id": "CSAFPID-2698965",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
                    "product": {
                      "name": "vers:oracle/\u003e=24.2.1|\u003c=24.2.4",
                      "product_id": "CSAFPID-2698944",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.1-24.2.4:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Policy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839952",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-2699038",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Certificate Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839951",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-2699059",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Console"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839919",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698957",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Repository Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.0",
                    "product": {
                      "name": "vers:oracle/23.4.0",
                      "product_id": "CSAFPID-1839924",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839910",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.1",
                    "product": {
                      "name": "vers:oracle/24.2.1",
                      "product_id": "CSAFPID-1839909",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839894",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2698958",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2699094",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839934",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-2699086",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839935",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.1.100",
                    "product": {
                      "name": "vers:oracle/25.1.100",
                      "product_id": "CSAFPID-2699073",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:25.1.100:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Service Communication Proxy"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/46.6",
                    "product": {
                      "name": "vers:oracle/46.6",
                      "product_id": "CSAFPID-2698993",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications EAGLE Element Management System"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/5.1",
                    "product": {
                      "name": "vers:oracle/5.1",
                      "product_id": "CSAFPID-1839893",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/5.2",
                    "product": {
                      "name": "vers:oracle/5.2",
                      "product_id": "CSAFPID-1839895",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Operations Monitor"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.11",
                    "product": {
                      "name": "vers:oracle/12.11",
                      "product_id": "CSAFPID-1839890",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.0",
                    "product": {
                      "name": "vers:oracle/14.0",
                      "product_id": "CSAFPID-1839891",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/14.0.0",
                    "product": {
                      "name": "vers:oracle/14.0.0",
                      "product_id": "CSAFPID-2699072",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0",
                    "product": {
                      "name": "vers:oracle/15.0",
                      "product_id": "CSAFPID-1839961",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0",
                      "product_id": "CSAFPID-2699023",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1",
                    "product": {
                      "name": "vers:oracle/15.0.1",
                      "product_id": "CSAFPID-2699025",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.2",
                    "product": {
                      "name": "vers:oracle/15.0.2",
                      "product_id": "CSAFPID-2699024",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications User Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0.0",
                      "product_id": "CSAFPID-2698999",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Diameter Signaling Router"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2698996",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:management_cloud_engine:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Management Cloud Engine"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-2699007",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Data Analytics Function"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1839868",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.5",
                    "product": {
                      "name": "vers:oracle/24.2.5",
                      "product_id": "CSAFPID-2699029",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839869",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0",
                      "product_id": "CSAFPID-2699013",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.1",
                    "product": {
                      "name": "vers:oracle/9.0.1",
                      "product_id": "CSAFPID-2699012",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.2",
                    "product": {
                      "name": "vers:oracle/9.0.2",
                      "product_id": "CSAFPID-2699016",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.3",
                    "product": {
                      "name": "vers:oracle/9.0.3",
                      "product_id": "CSAFPID-2699015",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2699098",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Element Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-1839960",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Policy Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.0",
                    "product": {
                      "name": "vers:oracle/9.0.0",
                      "product_id": "CSAFPID-2699093",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.1",
                    "product": {
                      "name": "vers:oracle/9.0.1",
                      "product_id": "CSAFPID-2699092",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.2",
                    "product": {
                      "name": "vers:oracle/9.0.2",
                      "product_id": "CSAFPID-2699091",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.0.3",
                    "product": {
                      "name": "vers:oracle/9.0.3",
                      "product_id": "CSAFPID-2699090",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                    "product": {
                      "name": "vers:oracle/\u003e=9.0.0|\u003c=9.0.3",
                      "product_id": "CSAFPID-2699124",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0-9.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Session Report Manager"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.1.1.9",
                    "product": {
                      "name": "vers:oracle/9.1.1.9",
                      "product_id": "CSAFPID-2698959",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:sd-wan_edge:9.1.1.9:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle SD-WAN Edge"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/22.4.0",
                    "product": {
                      "name": "vers:oracle/22.4.0",
                      "product_id": "CSAFPID-2699181",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/23.4.4",
                    "product": {
                      "name": "vers:oracle/23.4.4",
                      "product_id": "CSAFPID-1839930",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.1.1",
                    "product": {
                      "name": "vers:oracle/24.1.1",
                      "product_id": "CSAFPID-1839933",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.2",
                    "product": {
                      "name": "vers:oracle/24.2.2",
                      "product_id": "CSAFPID-1839931",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.3",
                    "product": {
                      "name": "vers:oracle/24.2.3",
                      "product_id": "CSAFPID-1839963",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-1839932",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/25.1.100",
                    "product": {
                      "name": "vers:oracle/25.1.100",
                      "product_id": "CSAFPID-2698956",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:25.1.100:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
                    "product": {
                      "name": "vers:oracle/\u003e=23.1.0|\u003c=23.4.0",
                      "product_id": "CSAFPID-2699180",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0-23.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Cloud Native Core Unified Data Repository"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/10.0.0",
                    "product": {
                      "name": "vers:oracle/10.0.0",
                      "product_id": "CSAFPID-2699083",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:10.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.2.0",
                    "product": {
                      "name": "vers:oracle/9.2.0",
                      "product_id": "CSAFPID-1839887",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/9.3.0",
                    "product": {
                      "name": "vers:oracle/9.3.0",
                      "product_id": "CSAFPID-1839889",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Session Border Controller"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/4.1.0",
                    "product": {
                      "name": "vers:oracle/4.1.0",
                      "product_id": "CSAFPID-1839888",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.1.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/4.2.0",
                    "product": {
                      "name": "vers:oracle/4.2.0",
                      "product_id": "CSAFPID-1839886",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:enterprise_communications_broker:4.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Enterprise Communications Broker"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.1.0",
                    "product": {
                      "name": "vers:oracle/24.1.0",
                      "product_id": "CSAFPID-1839925",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.2.0",
                    "product": {
                      "name": "vers:oracle/24.2.0",
                      "product_id": "CSAFPID-1840027",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/24.3.0",
                    "product": {
                      "name": "vers:oracle/24.3.0",
                      "product_id": "CSAFPID-2699041",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
                    "product": {
                      "name": "vers:oracle/\u003e=24.1.0|\u003c=24.3.0",
                      "product_id": "CSAFPID-2698961",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0-24.3.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Analytics Data Director"
              }
            ],
            "category": "product_family",
            "name": "Oracle Communications"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.1",
                  "product_id": "CSAFPID-1145869"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.3",
                  "product_id": "CSAFPID-1145271",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.5",
                  "product_id": "CSAFPID-1173947",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Binding Support Function"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.2",
                  "product_id": "CSAFPID-1145868"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.4",
                  "product_id": "CSAFPID-1145270",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
                "product": {
                  "name": "vers:oracle/\u003e=23.4.0|\u003c=23.4.6",
                  "product_id": "CSAFPID-1173946",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Policy"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.3",
                "product": {
                  "name": "vers:oracle/23.4.3",
                  "product_id": "CSAFPID-1173942",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173945",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Certificate Management"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.2",
                "product": {
                  "name": "vers:oracle/23.4.2",
                  "product_id": "CSAFPID-1173940",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173941",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Console"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.4",
                "product": {
                  "name": "vers:oracle/23.4.4",
                  "product_id": "CSAFPID-1173965",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.1",
                "product": {
                  "name": "vers:oracle/24.2.1",
                  "product_id": "CSAFPID-1173967",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Network Repository Function"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.2",
                "product": {
                  "name": "vers:oracle/23.4.2",
                  "product_id": "CSAFPID-1173943",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1173944",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.0",
                "product": {
                  "name": "vers:oracle/23.4.0",
                  "product_id": "CSAFPID-1145265",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.1.0",
                "product": {
                  "name": "vers:oracle/24.1.0",
                  "product_id": "CSAFPID-1145273",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.2.0",
                "product": {
                  "name": "vers:oracle/24.2.0",
                  "product_id": "CSAFPID-1174046",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Service Communication Proxy"
          },
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.3.6",
                    "product": {
                      "name": "vers:oracle/7.3.6",
                      "product_id": "CSAFPID-2699077",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.0",
                    "product": {
                      "name": "vers:oracle/7.4.0",
                      "product_id": "CSAFPID-2699075",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-2699076",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Integrity"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/6.0",
                    "product": {
                      "name": "vers:oracle/6.0",
                      "product_id": "CSAFPID-2699027",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0.0|\u003c=6.0.5",
                      "product_id": "CSAFPID-1839852",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0.4|\u003c=6.0.5",
                      "product_id": "CSAFPID-1840033",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=6.0|\u003c=6.1",
                    "product": {
                      "name": "vers:oracle/\u003e=6.0|\u003c=6.1",
                      "product_id": "CSAFPID-2698955",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0-6.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Unified Assurance"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/12.0.0.8.0",
                      "product_id": "CSAFPID-2699001",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699084",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699079",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                      "product_id": "CSAFPID-2699058",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4|\u003c=12.0.0.8",
                      "product_id": "CSAFPID-1839957",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/\u003e=15.0.0.0.0|\u003c=15.0.1.0.0",
                      "product_id": "CSAFPID-2699000",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0-15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
                    "product": {
                      "name": "vers:oracle/\u003e=15.0.0.0|\u003c=15.0.0.1",
                      "product_id": "CSAFPID-1839953",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Billing and Revenue Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.26.0",
                    "product": {
                      "name": "vers:oracle/8.1.0.26.0",
                      "product_id": "CSAFPID-2698964",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Messaging Server"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/6.3.1",
                    "product": {
                      "name": "vers:oracle/6.3.1",
                      "product_id": "CSAFPID-2698991",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications MetaSolv Solution"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/12.0.6.0.0",
                    "product": {
                      "name": "vers:oracle/12.0.6.0.0",
                      "product_id": "CSAFPID-2699127",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699126",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699128",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Network Charging and Control"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.0",
                    "product": {
                      "name": "vers:oracle/7.4.0",
                      "product_id": "CSAFPID-1839980",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-1840004",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.1",
                    "product": {
                      "name": "vers:oracle/7.4.1",
                      "product_id": "CSAFPID-1839981",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Order and Service Management"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.0.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.0.0.0",
                      "product_id": "CSAFPID-2699056",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/15.0.1.0.0",
                    "product": {
                      "name": "vers:oracle/15.0.1.0.0",
                      "product_id": "CSAFPID-2699063",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.1.0.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                    "product": {
                      "name": "vers:oracle/\u003e=12.0.0.4.0|\u003c=12.0.0.8.0",
                      "product_id": "CSAFPID-2699060",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Pricing Design Center"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.0.0.3",
                    "product": {
                      "name": "vers:oracle/8.0.0.3",
                      "product_id": "CSAFPID-1839921",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.0.0.4.0",
                    "product": {
                      "name": "vers:oracle/8.0.0.4.0",
                      "product_id": "CSAFPID-2698975",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.4.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.1",
                    "product": {
                      "name": "vers:oracle/8.1.0.1",
                      "product_id": "CSAFPID-1839922",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/8.1.0.2.0",
                    "product": {
                      "name": "vers:oracle/8.1.0.2.0",
                      "product_id": "CSAFPID-2698974",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.2.0:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Service Catalog and Design"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.1",
                    "product": {
                      "name": "vers:oracle/7.4.1",
                      "product_id": "CSAFPID-1839978",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.4.2",
                    "product": {
                      "name": "vers:oracle/7.4.2",
                      "product_id": "CSAFPID-1839979",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.0",
                    "product": {
                      "name": "vers:oracle/7.5.0",
                      "product_id": "CSAFPID-2699035",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.5.1",
                    "product": {
                      "name": "vers:oracle/7.5.1",
                      "product_id": "CSAFPID-1839983",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.6.0",
                    "product": {
                      "name": "vers:oracle/7.6.0",
                      "product_id": "CSAFPID-1840005",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.6.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/7.7.0",
                    "product": {
                      "name": "vers:oracle/7.7.0",
                      "product_id": "CSAFPID-2699034",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.7.0:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
                    "product": {
                      "name": "vers:oracle/\u003e=7.4.0|\u003c=7.4.2",
                      "product_id": "CSAFPID-2699036",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0-7.4.2:*:*:*:*:*:*:*"
                      }
                    }
                  },
                  {
                    "category": "product_version_range",
                    "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
                    "product": {
                      "name": "vers:oracle/\u003e=7.5.0|\u003c=7.5.1",
                      "product_id": "CSAFPID-2699096",
                      "product_identification_helper": {
                        "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0-7.5.1:*:*:*:*:*:*:*"
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oracle Communications Unified Inventory Management"
              }
            ],
            "category": "product_family",
            "name": "Oracle Communications Applications"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:oracle/23.4.0",
                "product": {
                  "name": "vers:oracle/23.4.0",
                  "product_id": "CSAFPID-1145246",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:oracle/24.1.0",
                "product": {
                  "name": "vers:oracle/24.1.0",
                  "product_id": "CSAFPID-1145247",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/7.4.0",
                "product": {
                  "name": "vers:semver/7.4.0",
                  "product_id": "CSAFPID-2698653"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/7.4.1",
                "product": {
                  "name": "vers:semver/7.4.1",
                  "product_id": "CSAFPID-2698654"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/7.5.0",
                "product": {
                  "name": "vers:semver/7.5.0",
                  "product_id": "CSAFPID-2698655"
                }
              }
            ],
            "category": "product_name",
            "name": "Oracle Communications Order and Service Management"
          }
        ],
        "category": "vendor",
        "name": "Oracle Corporation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-5388",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "other",
          "text": "Observable Timing Discrepancy",
          "title": "CWE-208"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5388",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5388.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-5388"
    },
    {
      "cve": "CVE-2023-5685",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5685",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-49582",
      "cwe": {
        "id": "CWE-732",
        "name": "Incorrect Permission Assignment for Critical Resource"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Permission Assignment for Critical Resource",
          "title": "CWE-732"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-49582",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-49582.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-49582"
    },
    {
      "cve": "CVE-2023-51074",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51074",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51074.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2023-51074"
    },
    {
      "cve": "CVE-2024-1135",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-1135",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-1135"
    },
    {
      "cve": "CVE-2024-4227",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4227",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4227.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-4227"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5535",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-6763",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Validation of Syntactic Correctness of Input",
          "title": "CWE-1286"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6763",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6763.json"
        }
      ],
      "title": "CVE-2024-6763"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-11053.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-12797",
      "cwe": {
        "id": "CWE-392",
        "name": "Missing Report of Error Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Report of Error Condition",
          "title": "CWE-392"
        },
        {
          "category": "other",
          "text": "Dependency on Vulnerable Third-Party Component",
          "title": "CWE-1395"
        },
        {
          "category": "other",
          "text": "Improper Certificate Validation",
          "title": "CWE-295"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12797",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12797.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-12797"
    },
    {
      "cve": "CVE-2024-12798",
      "cwe": {
        "id": "CWE-917",
        "name": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an Expression Language Statement (\u0027Expression Language Injection\u0027)",
          "title": "CWE-917"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/RE:L/U:Clear",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-12798",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-12798.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-12798"
    },
    {
      "cve": "CVE-2024-21538",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-21538",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21538.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-21538"
    },
    {
      "cve": "CVE-2024-25638",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        },
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25638",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-28168",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28168",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28168.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28168"
    },
    {
      "cve": "CVE-2024-28219",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
          "title": "CWE-120"
        },
        {
          "category": "other",
          "text": "Use of Potentially Dangerous Function",
          "title": "CWE-676"
        },
        {
          "category": "other",
          "text": "Integer Overflow to Buffer Overflow",
          "title": "CWE-680"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28219",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28219"
    },
    {
      "cve": "CVE-2024-28834",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Use of a Broken or Risky Cryptographic Algorithm",
          "title": "CWE-327"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28834",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-31141",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Files or Directories Accessible to External Parties",
          "title": "CWE-552"
        },
        {
          "category": "other",
          "text": "Improper Privilege Management",
          "title": "CWE-269"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31141",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31141.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-31141"
    },
    {
      "cve": "CVE-2024-34064",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34064",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-34064"
    },
    {
      "cve": "CVE-2024-35195",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Always-Incorrect Control Flow Implementation",
          "title": "CWE-670"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-35195",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-35195"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38819",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38819",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-38819"
    },
    {
      "cve": "CVE-2024-38827",
      "cwe": {
        "id": "CWE-639",
        "name": "Authorization Bypass Through User-Controlled Key"
      },
      "notes": [
        {
          "category": "other",
          "text": "Authorization Bypass Through User-Controlled Key",
          "title": "CWE-639"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38827",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-38827"
    },
    {
      "cve": "CVE-2024-40896",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of XML External Entity Reference",
          "title": "CWE-611"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40896",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40896.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-40896"
    },
    {
      "cve": "CVE-2024-43044",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43044",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-43709",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43709",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43709.json"
        }
      ],
      "title": "CVE-2024-43709"
    },
    {
      "cve": "CVE-2024-43796",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
          "title": "CWE-79"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43796",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43796.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-43796"
    },
    {
      "cve": "CVE-2024-47072",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47072",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47072.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-47072"
    },
    {
      "cve": "CVE-2024-47554",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-47554",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-47554"
    },
    {
      "cve": "CVE-2024-49767",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-49767",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-49767"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-50602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-52046",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52046",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52046.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-52046"
    },
    {
      "cve": "CVE-2024-52303",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-52303",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-52303.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-52303"
    },
    {
      "cve": "CVE-2024-53122",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Divide By Zero",
          "title": "CWE-369"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-53122",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53122.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-53122"
    },
    {
      "cve": "CVE-2024-56128",
      "cwe": {
        "id": "CWE-303",
        "name": "Incorrect Implementation of Authentication Algorithm"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Implementation of Authentication Algorithm",
          "title": "CWE-303"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56128",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56128.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-56128"
    },
    {
      "cve": "CVE-2024-56337",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
          "title": "CWE-367"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-56337",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-56337"
    },
    {
      "cve": "CVE-2024-57699",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-57699",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-57699.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2024-57699"
    },
    {
      "cve": "CVE-2025-1974",
      "cwe": {
        "id": "CWE-653",
        "name": "Improper Isolation or Compartmentalization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Isolation or Compartmentalization",
          "title": "CWE-653"
        },
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-1974",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-1974.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-1974"
    },
    {
      "cve": "CVE-2025-23084",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-23084",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23084.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-23084"
    },
    {
      "cve": "CVE-2025-23184",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-23184",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-23184.json"
        }
      ],
      "title": "CVE-2025-23184"
    },
    {
      "cve": "CVE-2025-24813",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "other",
          "text": "Deserialization of Untrusted Data",
          "title": "CWE-502"
        },
        {
          "category": "other",
          "text": "Path Equivalence: \u0027file.name\u0027 (Internal Dot)",
          "title": "CWE-44"
        },
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        },
        {
          "category": "other",
          "text": "Use of Incorrectly-Resolved Name or Reference",
          "title": "CWE-706"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24813",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24813.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24813"
    },
    {
      "cve": "CVE-2025-24928",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "other",
          "text": "Stack-based Buffer Overflow",
          "title": "CWE-121"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24928",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24928.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24928"
    },
    {
      "cve": "CVE-2025-24970",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-24970",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24970.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-24970"
    },
    {
      "cve": "CVE-2025-27516",
      "cwe": {
        "id": "CWE-1336",
        "name": "Improper Neutralization of Special Elements Used in a Template Engine"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements Used in a Template Engine",
          "title": "CWE-1336"
        },
        {
          "category": "general",
          "text": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
          "title": "CVSSV4"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27516",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27516.json"
        }
      ],
      "title": "CVE-2025-27516"
    },
    {
      "cve": "CVE-2025-27789",
      "cwe": {
        "id": "CWE-1333",
        "name": "Inefficient Regular Expression Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Regular Expression Complexity",
          "title": "CWE-1333"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-27789",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27789.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-27789"
    },
    {
      "cve": "CVE-2025-30729",
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-30729",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30729.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-30729"
    },
    {
      "cve": "CVE-2025-31721",
      "cwe": {
        "id": "CWE-862",
        "name": "Missing Authorization"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Authorization",
          "title": "CWE-862"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1838578",
          "CSAFPID-1839911",
          "CSAFPID-1839908",
          "CSAFPID-1145869",
          "CSAFPID-1145271",
          "CSAFPID-1173947",
          "CSAFPID-2698963",
          "CSAFPID-2698973",
          "CSAFPID-2699085",
          "CSAFPID-1839941",
          "CSAFPID-1838591",
          "CSAFPID-1145868",
          "CSAFPID-1145270",
          "CSAFPID-1173946",
          "CSAFPID-1839907",
          "CSAFPID-2698965",
          "CSAFPID-2698944",
          "CSAFPID-1173942",
          "CSAFPID-1173945",
          "CSAFPID-1839952",
          "CSAFPID-2699038",
          "CSAFPID-1838592",
          "CSAFPID-1173940",
          "CSAFPID-1173941",
          "CSAFPID-1839951",
          "CSAFPID-2699059",
          "CSAFPID-1173965",
          "CSAFPID-1173967",
          "CSAFPID-1839919",
          "CSAFPID-2698957",
          "CSAFPID-1838572",
          "CSAFPID-1838581",
          "CSAFPID-1838584",
          "CSAFPID-1839924",
          "CSAFPID-1173943",
          "CSAFPID-1173944",
          "CSAFPID-1839910",
          "CSAFPID-1839909",
          "CSAFPID-1839894",
          "CSAFPID-2698958",
          "CSAFPID-2699094",
          "CSAFPID-1145265",
          "CSAFPID-1145273",
          "CSAFPID-1174046",
          "CSAFPID-1839934",
          "CSAFPID-2699086",
          "CSAFPID-1839935",
          "CSAFPID-2699073",
          "CSAFPID-2698993",
          "CSAFPID-1839893",
          "CSAFPID-1839895",
          "CSAFPID-1839890",
          "CSAFPID-1839891",
          "CSAFPID-2699072",
          "CSAFPID-1839961",
          "CSAFPID-2699023",
          "CSAFPID-2699025",
          "CSAFPID-2699024",
          "CSAFPID-2698999",
          "CSAFPID-2699077",
          "CSAFPID-2699075",
          "CSAFPID-2699076",
          "CSAFPID-2698355",
          "CSAFPID-2699027",
          "CSAFPID-1839852",
          "CSAFPID-1840033",
          "CSAFPID-2698955",
          "CSAFPID-2699001",
          "CSAFPID-2699084",
          "CSAFPID-2699079",
          "CSAFPID-2699058",
          "CSAFPID-1839957",
          "CSAFPID-2699000",
          "CSAFPID-1839953",
          "CSAFPID-2698964",
          "CSAFPID-2698991",
          "CSAFPID-2699127",
          "CSAFPID-2699126",
          "CSAFPID-2699128",
          "CSAFPID-1839980",
          "CSAFPID-1840004",
          "CSAFPID-1839981",
          "CSAFPID-2698653",
          "CSAFPID-2698654",
          "CSAFPID-2698655",
          "CSAFPID-2699056",
          "CSAFPID-2699063",
          "CSAFPID-2699060",
          "CSAFPID-1839921",
          "CSAFPID-2698975",
          "CSAFPID-1839922",
          "CSAFPID-2698974",
          "CSAFPID-1839978",
          "CSAFPID-1839979",
          "CSAFPID-2699035",
          "CSAFPID-1839983",
          "CSAFPID-1840005",
          "CSAFPID-2699034",
          "CSAFPID-2699036",
          "CSAFPID-2699096",
          "CSAFPID-2698996",
          "CSAFPID-2698333",
          "CSAFPID-2698334",
          "CSAFPID-2699007",
          "CSAFPID-2698374",
          "CSAFPID-1145246",
          "CSAFPID-1145247",
          "CSAFPID-1839868",
          "CSAFPID-2699029",
          "CSAFPID-1839869",
          "CSAFPID-1234193",
          "CSAFPID-1234261",
          "CSAFPID-2698362",
          "CSAFPID-2698358",
          "CSAFPID-2698372",
          "CSAFPID-2699013",
          "CSAFPID-2699012",
          "CSAFPID-2699016",
          "CSAFPID-2699015",
          "CSAFPID-2699098",
          "CSAFPID-1837923",
          "CSAFPID-1839960",
          "CSAFPID-2698373",
          "CSAFPID-2699093",
          "CSAFPID-2699092",
          "CSAFPID-2699091",
          "CSAFPID-2699090",
          "CSAFPID-2699124",
          "CSAFPID-2698959",
          "CSAFPID-2698357",
          "CSAFPID-1838579",
          "CSAFPID-1838582",
          "CSAFPID-2699181",
          "CSAFPID-1839930",
          "CSAFPID-1839933",
          "CSAFPID-1839931",
          "CSAFPID-1839963",
          "CSAFPID-1839932",
          "CSAFPID-2698956",
          "CSAFPID-2699180",
          "CSAFPID-2698381",
          "CSAFPID-1207518",
          "CSAFPID-1207704",
          "CSAFPID-2699083",
          "CSAFPID-1839887",
          "CSAFPID-1839889",
          "CSAFPID-1207607",
          "CSAFPID-1207752",
          "CSAFPID-1839888",
          "CSAFPID-1839886",
          "CSAFPID-1839925",
          "CSAFPID-1840027",
          "CSAFPID-2699041",
          "CSAFPID-2698961",
          "CSAFPID-1838586"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2025-31721",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31721.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1838578",
            "CSAFPID-1839911",
            "CSAFPID-1839908",
            "CSAFPID-1145869",
            "CSAFPID-1145271",
            "CSAFPID-1173947",
            "CSAFPID-2698963",
            "CSAFPID-2698973",
            "CSAFPID-2699085",
            "CSAFPID-1839941",
            "CSAFPID-1838591",
            "CSAFPID-1145868",
            "CSAFPID-1145270",
            "CSAFPID-1173946",
            "CSAFPID-1839907",
            "CSAFPID-2698965",
            "CSAFPID-2698944",
            "CSAFPID-1173942",
            "CSAFPID-1173945",
            "CSAFPID-1839952",
            "CSAFPID-2699038",
            "CSAFPID-1838592",
            "CSAFPID-1173940",
            "CSAFPID-1173941",
            "CSAFPID-1839951",
            "CSAFPID-2699059",
            "CSAFPID-1173965",
            "CSAFPID-1173967",
            "CSAFPID-1839919",
            "CSAFPID-2698957",
            "CSAFPID-1838572",
            "CSAFPID-1838581",
            "CSAFPID-1838584",
            "CSAFPID-1839924",
            "CSAFPID-1173943",
            "CSAFPID-1173944",
            "CSAFPID-1839910",
            "CSAFPID-1839909",
            "CSAFPID-1839894",
            "CSAFPID-2698958",
            "CSAFPID-2699094",
            "CSAFPID-1145265",
            "CSAFPID-1145273",
            "CSAFPID-1174046",
            "CSAFPID-1839934",
            "CSAFPID-2699086",
            "CSAFPID-1839935",
            "CSAFPID-2699073",
            "CSAFPID-2698993",
            "CSAFPID-1839893",
            "CSAFPID-1839895",
            "CSAFPID-1839890",
            "CSAFPID-1839891",
            "CSAFPID-2699072",
            "CSAFPID-1839961",
            "CSAFPID-2699023",
            "CSAFPID-2699025",
            "CSAFPID-2699024",
            "CSAFPID-2698999",
            "CSAFPID-2699077",
            "CSAFPID-2699075",
            "CSAFPID-2699076",
            "CSAFPID-2698355",
            "CSAFPID-2699027",
            "CSAFPID-1839852",
            "CSAFPID-1840033",
            "CSAFPID-2698955",
            "CSAFPID-2699001",
            "CSAFPID-2699084",
            "CSAFPID-2699079",
            "CSAFPID-2699058",
            "CSAFPID-1839957",
            "CSAFPID-2699000",
            "CSAFPID-1839953",
            "CSAFPID-2698964",
            "CSAFPID-2698991",
            "CSAFPID-2699127",
            "CSAFPID-2699126",
            "CSAFPID-2699128",
            "CSAFPID-1839980",
            "CSAFPID-1840004",
            "CSAFPID-1839981",
            "CSAFPID-2698653",
            "CSAFPID-2698654",
            "CSAFPID-2698655",
            "CSAFPID-2699056",
            "CSAFPID-2699063",
            "CSAFPID-2699060",
            "CSAFPID-1839921",
            "CSAFPID-2698975",
            "CSAFPID-1839922",
            "CSAFPID-2698974",
            "CSAFPID-1839978",
            "CSAFPID-1839979",
            "CSAFPID-2699035",
            "CSAFPID-1839983",
            "CSAFPID-1840005",
            "CSAFPID-2699034",
            "CSAFPID-2699036",
            "CSAFPID-2699096",
            "CSAFPID-2698996",
            "CSAFPID-2698333",
            "CSAFPID-2698334",
            "CSAFPID-2699007",
            "CSAFPID-2698374",
            "CSAFPID-1145246",
            "CSAFPID-1145247",
            "CSAFPID-1839868",
            "CSAFPID-2699029",
            "CSAFPID-1839869",
            "CSAFPID-1234193",
            "CSAFPID-1234261",
            "CSAFPID-2698362",
            "CSAFPID-2698358",
            "CSAFPID-2698372",
            "CSAFPID-2699013",
            "CSAFPID-2699012",
            "CSAFPID-2699016",
            "CSAFPID-2699015",
            "CSAFPID-2699098",
            "CSAFPID-1837923",
            "CSAFPID-1839960",
            "CSAFPID-2698373",
            "CSAFPID-2699093",
            "CSAFPID-2699092",
            "CSAFPID-2699091",
            "CSAFPID-2699090",
            "CSAFPID-2699124",
            "CSAFPID-2698959",
            "CSAFPID-2698357",
            "CSAFPID-1838579",
            "CSAFPID-1838582",
            "CSAFPID-2699181",
            "CSAFPID-1839930",
            "CSAFPID-1839933",
            "CSAFPID-1839931",
            "CSAFPID-1839963",
            "CSAFPID-1839932",
            "CSAFPID-2698956",
            "CSAFPID-2699180",
            "CSAFPID-2698381",
            "CSAFPID-1207518",
            "CSAFPID-1207704",
            "CSAFPID-2699083",
            "CSAFPID-1839887",
            "CSAFPID-1839889",
            "CSAFPID-1207607",
            "CSAFPID-1207752",
            "CSAFPID-1839888",
            "CSAFPID-1839886",
            "CSAFPID-1839925",
            "CSAFPID-1840027",
            "CSAFPID-2699041",
            "CSAFPID-2698961",
            "CSAFPID-1838586"
          ]
        }
      ],
      "title": "CVE-2025-31721"
    }
  ]
}
  ghsa-h288-5fq8-5pfw
Vulnerability from github
When asked to both use a .netrc file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.
This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
{
  "affected": [],
  "aliases": [
    "CVE-2024-11053"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-12-11T08:15:05Z",
    "severity": "CRITICAL"
  },
  "details": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
  "id": "GHSA-h288-5fq8-5pfw",
  "modified": "2025-01-31T15:30:43Z",
  "published": "2024-12-11T09:32:03Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
    },
    {
      "type": "WEB",
      "url": "https://hackerone.com/reports/2829063"
    },
    {
      "type": "WEB",
      "url": "https://curl.se/docs/CVE-2024-11053.html"
    },
    {
      "type": "WEB",
      "url": "https://curl.se/docs/CVE-2024-11053.json"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20250124-0012"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20250131-0003"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2024/12/11/1"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
      "type": "CVSS_V3"
    }
  ]
}
  ssa-398330
Vulnerability from csaf_siemens
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)",
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version  \u003e= V3.1.0 and \u003c V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. \nSiemens has released new versions for the affected products and recommends to update to the latest versions.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "productcert@siemens.com",
      "name": "Siemens ProductCERT",
      "namespace": "https://www.siemens.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP  \u003e= V3.1.0 and \u003c V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html"
      },
      {
        "category": "self",
        "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP  \u003e= V3.1.0 and \u003c V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json"
      }
    ],
    "title": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP  \u003e= V3.1.0 and \u003c V3.1.5",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00Z",
      "generator": {
        "engine": {
          "name": "Siemens ProductCERT CSAF Generator",
          "version": "1"
        }
      },
      "id": "SSA-398330",
      "initial_release_date": "2023-12-12T00:00:00Z",
      "revision_history": [
        {
          "date": "2023-12-12T00:00:00Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2024-01-09T00:00:00Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795"
        },
        {
          "date": "2024-02-13T00:00:00Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584"
        },
        {
          "date": "2024-03-12T00:00:00Z",
          "legacy_version": "1.3",
          "number": "4",
          "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918"
        },
        {
          "date": "2024-04-09T00:00:00Z",
          "legacy_version": "1.4",
          "number": "5",
          "summary": "Added CVE-2024-28757"
        },
        {
          "date": "2024-05-14T00:00:00Z",
          "legacy_version": "1.5",
          "number": "6",
          "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835"
        },
        {
          "date": "2024-06-11T00:00:00Z",
          "legacy_version": "1.6",
          "number": "7",
          "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459"
        },
        {
          "date": "2024-07-09T00:00:00Z",
          "legacy_version": "1.7",
          "number": "8",
          "summary": "Added CVE-2024-5535, CVE-2024-5742"
        },
        {
          "date": "2024-08-13T00:00:00Z",
          "legacy_version": "1.8",
          "number": "9",
          "summary": "Added CVE-2017-15422, CVE-2024-7264, CVE-2024-37370, CVE-2024-37371"
        },
        {
          "date": "2024-10-08T00:00:00Z",
          "legacy_version": "1.9",
          "number": "10",
          "summary": "Added CVE-2024-6409, CVE-2024-8096, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492"
        },
        {
          "date": "2024-11-12T00:00:00Z",
          "legacy_version": "2.0",
          "number": "11",
          "summary": "Added CVE-2024-2236, CVE-2024-9143"
        },
        {
          "date": "2024-12-10T00:00:00Z",
          "legacy_version": "2.1",
          "number": "12",
          "summary": "Added CVE-2024-50602, CVE-2024-52533"
        },
        {
          "date": "2025-01-14T00:00:00Z",
          "legacy_version": "2.2",
          "number": "13",
          "summary": "Added CVE-2024-11053"
        },
        {
          "date": "2025-02-11T00:00:00Z",
          "legacy_version": "2.3",
          "number": "14",
          "summary": "Added multiple CVEs"
        },
        {
          "date": "2025-03-11T00:00:00Z",
          "legacy_version": "2.4",
          "number": "15",
          "summary": "Added CVE-2023-52622, CVE-2024-12133, -12243, -26645, -26671, -26679, -26772, -26773, -26777, -26805, -26923, -27020, -27032, -36017, -36484, -36904, -36905, -36934, -39487, -41046, -42106, -42131, -42154, -43871, -44944, -44965, -46743, -46745, -46750, -47684, -47701, -47737, -49881, -49884, -49948, -49949, -49952, -49997, -50006, -50040, -50045, -50251, -50262, -50299, -50301, -53057, -53140, -53165, -53217, CVE-2025-0167, -0395, -0665, -0725, -26465, -26466"
        },
        {
          "date": "2025-04-08T00:00:00Z",
          "legacy_version": "2.5",
          "number": "16",
          "summary": "Added CVE-2025-21694, CVE-2025-1390, CVE-2024-8176, CVE-2024-57901, CVE-2024-57884, CVE-2024-56780, CVE-2024-56779, CVE-2024-56770, CVE-2024-56650, CVE-2024-56644, CVE-2024-56606, CVE-2024-56601, CVE-2024-56600, CVE-2024-56570, CVE-2024-56569, CVE-2024-53164, CVE-2024-53124, CVE-2024-52332, CVE-2024-48881, CVE-2024-47707, CVE-2024-12243"
        },
        {
          "date": "2025-06-10T00:00:00Z",
          "legacy_version": "2.6",
          "number": "17",
          "summary": "Added fix for SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP incl. SIPLUS variants"
        },
        {
          "date": "2025-08-12T00:00:00Z",
          "legacy_version": "2.7",
          "number": "18",
          "summary": "Removed CVE-2021-41617, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-4527, CVE-2023-46218, CVE-2023-46219, CVE-2023-4806, CVE-2023-48795, CVE-2023-4911, CVE-2024-12133, CVE-2024-12243, CVE-2024-28085, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2025-26465, CVE-2025-46836 as they are not fixed in V3.1.5 and advised in SSA-082556"
        }
      ],
      "status": "interim",
      "version": "18"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "1",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "2",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "3",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "4",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "5",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-0340",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2013-0340"
    },
    {
      "cve": "CVE-2013-4235",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2013-4235"
    },
    {
      "cve": "CVE-2014-7209",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2014-7209"
    },
    {
      "cve": "CVE-2015-20107",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2016-3189",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-3189"
    },
    {
      "cve": "CVE-2016-3709",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-3709"
    },
    {
      "cve": "CVE-2016-4658",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2016-5131",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-5131"
    },
    {
      "cve": "CVE-2016-9318",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-9318"
    },
    {
      "cve": "CVE-2016-10228",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-10228"
    },
    {
      "cve": "CVE-2016-10739",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2016-10739"
    },
    {
      "cve": "CVE-2017-0663",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-0663"
    },
    {
      "cve": "CVE-2017-7375",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-7375"
    },
    {
      "cve": "CVE-2017-7376",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-7376"
    },
    {
      "cve": "CVE-2017-9047",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-9047"
    },
    {
      "cve": "CVE-2017-9048",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-9048"
    },
    {
      "cve": "CVE-2017-9049",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-9049"
    },
    {
      "cve": "CVE-2017-9050",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-9050"
    },
    {
      "cve": "CVE-2017-15422",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-15422"
    },
    {
      "cve": "CVE-2017-16931",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-16931"
    },
    {
      "cve": "CVE-2017-16932",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-16932"
    },
    {
      "cve": "CVE-2017-17512",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-17512"
    },
    {
      "cve": "CVE-2017-18258",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2017-18258"
    },
    {
      "cve": "CVE-2018-0495",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-0495"
    },
    {
      "cve": "CVE-2018-12886",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-12886"
    },
    {
      "cve": "CVE-2018-14404",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-14404"
    },
    {
      "cve": "CVE-2018-14567",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-14567"
    },
    {
      "cve": "CVE-2018-18928",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-18928"
    },
    {
      "cve": "CVE-2018-19591",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-19591"
    },
    {
      "cve": "CVE-2018-20482",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-20482"
    },
    {
      "cve": "CVE-2018-20843",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-20843"
    },
    {
      "cve": "CVE-2018-25032",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2019-3855",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3855"
    },
    {
      "cve": "CVE-2019-3856",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3856"
    },
    {
      "cve": "CVE-2019-3857",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3857"
    },
    {
      "cve": "CVE-2019-3858",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3858"
    },
    {
      "cve": "CVE-2019-3859",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3859"
    },
    {
      "cve": "CVE-2019-3860",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3860"
    },
    {
      "cve": "CVE-2019-3861",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3861"
    },
    {
      "cve": "CVE-2019-3862",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3862"
    },
    {
      "cve": "CVE-2019-3863",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-3863"
    },
    {
      "cve": "CVE-2019-5018",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5018"
    },
    {
      "cve": "CVE-2019-5094",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5094"
    },
    {
      "cve": "CVE-2019-5188",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5188"
    },
    {
      "cve": "CVE-2019-5435",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5435"
    },
    {
      "cve": "CVE-2019-5436",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5436"
    },
    {
      "cve": "CVE-2019-5443",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5443"
    },
    {
      "cve": "CVE-2019-5481",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5481"
    },
    {
      "cve": "CVE-2019-5482",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-5482"
    },
    {
      "cve": "CVE-2019-6109",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-6109"
    },
    {
      "cve": "CVE-2019-6110",
      "cwe": {
        "id": "CWE-838",
        "name": "Inappropriate Encoding for Output Context"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-6110"
    },
    {
      "cve": "CVE-2019-6111",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-6111"
    },
    {
      "cve": "CVE-2019-6488",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-6488"
    },
    {
      "cve": "CVE-2019-7309",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-7309"
    },
    {
      "cve": "CVE-2019-8457",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-8457"
    },
    {
      "cve": "CVE-2019-9169",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9169"
    },
    {
      "cve": "CVE-2019-9636",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9636"
    },
    {
      "cve": "CVE-2019-9674",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9674"
    },
    {
      "cve": "CVE-2019-9740",
      "cwe": {
        "id": "CWE-93",
        "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9740"
    },
    {
      "cve": "CVE-2019-9923",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9923"
    },
    {
      "cve": "CVE-2019-9936",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9936"
    },
    {
      "cve": "CVE-2019-9937",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9937"
    },
    {
      "cve": "CVE-2019-9947",
      "cwe": {
        "id": "CWE-93",
        "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9947"
    },
    {
      "cve": "CVE-2019-9948",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-9948"
    },
    {
      "cve": "CVE-2019-10160",
      "cwe": {
        "id": "CWE-172",
        "name": "Encoding Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-10160"
    },
    {
      "cve": "CVE-2019-11360",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-11360"
    },
    {
      "cve": "CVE-2019-12290",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-12290"
    },
    {
      "cve": "CVE-2019-12900",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-12900"
    },
    {
      "cve": "CVE-2019-12904",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-12904"
    },
    {
      "cve": "CVE-2019-13057",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-13057"
    },
    {
      "cve": "CVE-2019-13565",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-13565"
    },
    {
      "cve": "CVE-2019-13627",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-13627"
    },
    {
      "cve": "CVE-2019-15847",
      "cwe": {
        "id": "CWE-331",
        "name": "Insufficient Entropy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-15847"
    },
    {
      "cve": "CVE-2019-15903",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-15903"
    },
    {
      "cve": "CVE-2019-16056",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-16056"
    },
    {
      "cve": "CVE-2019-16168",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-16168"
    },
    {
      "cve": "CVE-2019-16905",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-16905"
    },
    {
      "cve": "CVE-2019-17498",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-17498"
    },
    {
      "cve": "CVE-2019-17543",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-17543"
    },
    {
      "cve": "CVE-2019-17594",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-17594"
    },
    {
      "cve": "CVE-2019-17595",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-17595"
    },
    {
      "cve": "CVE-2019-18224",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-18224"
    },
    {
      "cve": "CVE-2019-18276",
      "cwe": {
        "id": "CWE-273",
        "name": "Improper Check for Dropped Privileges"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-18276"
    },
    {
      "cve": "CVE-2019-18348",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-18348"
    },
    {
      "cve": "CVE-2019-19126",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19126"
    },
    {
      "cve": "CVE-2019-19242",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19242"
    },
    {
      "cve": "CVE-2019-19244",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19244"
    },
    {
      "cve": "CVE-2019-19317",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19317"
    },
    {
      "cve": "CVE-2019-19603",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19603"
    },
    {
      "cve": "CVE-2019-19645",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19645"
    },
    {
      "cve": "CVE-2019-19646",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19646"
    },
    {
      "cve": "CVE-2019-19880",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19880"
    },
    {
      "cve": "CVE-2019-19906",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2019-19923",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19923"
    },
    {
      "cve": "CVE-2019-19924",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19924"
    },
    {
      "cve": "CVE-2019-19925",
      "cwe": {
        "id": "CWE-434",
        "name": "Unrestricted Upload of File with Dangerous Type"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19925"
    },
    {
      "cve": "CVE-2019-19926",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19926"
    },
    {
      "cve": "CVE-2019-19956",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19956"
    },
    {
      "cve": "CVE-2019-19959",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-19959"
    },
    {
      "cve": "CVE-2019-20218",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-20218"
    },
    {
      "cve": "CVE-2019-20367",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-20367"
    },
    {
      "cve": "CVE-2019-20388",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-20388"
    },
    {
      "cve": "CVE-2019-20795",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-20795"
    },
    {
      "cve": "CVE-2019-20907",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-20907"
    },
    {
      "cve": "CVE-2019-25013",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-25013"
    },
    {
      "cve": "CVE-2019-1010022",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-1010022"
    },
    {
      "cve": "CVE-2019-1010023",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-1010023"
    },
    {
      "cve": "CVE-2019-1010024",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-1010024"
    },
    {
      "cve": "CVE-2019-1010025",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-1010025"
    },
    {
      "cve": "CVE-2019-1010180",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2019-1010180"
    },
    {
      "cve": "CVE-2020-1712",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-1712"
    },
    {
      "cve": "CVE-2020-1751",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-1751"
    },
    {
      "cve": "CVE-2020-1752",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-1752"
    },
    {
      "cve": "CVE-2020-6096",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-6096"
    },
    {
      "cve": "CVE-2020-7595",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-7595"
    },
    {
      "cve": "CVE-2020-8169",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcurl library versions 7.62.0 to and including  7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8169"
    },
    {
      "cve": "CVE-2020-8177",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8177"
    },
    {
      "cve": "CVE-2020-8231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8231"
    },
    {
      "cve": "CVE-2020-8284",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8284"
    },
    {
      "cve": "CVE-2020-8285",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8285"
    },
    {
      "cve": "CVE-2020-8286",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcurl library versions 7.41.0 to and including  7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8286"
    },
    {
      "cve": "CVE-2020-8315",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8315"
    },
    {
      "cve": "CVE-2020-8492",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-8492"
    },
    {
      "cve": "CVE-2020-9327",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-9327"
    },
    {
      "cve": "CVE-2020-10029",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-10029"
    },
    {
      "cve": "CVE-2020-10531",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-10531"
    },
    {
      "cve": "CVE-2020-10543",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-10543"
    },
    {
      "cve": "CVE-2020-10735",
      "cwe": {
        "id": "CWE-704",
        "name": "Incorrect Type Conversion or Cast"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-10878",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-10878"
    },
    {
      "cve": "CVE-2020-11501",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-11501"
    },
    {
      "cve": "CVE-2020-11655",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-11655"
    },
    {
      "cve": "CVE-2020-11656",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-11656"
    },
    {
      "cve": "CVE-2020-12062",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-12062"
    },
    {
      "cve": "CVE-2020-12243",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running (for details refer to the updated security manual of WinCC OA).",
          "product_ids": [
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-12243"
    },
    {
      "cve": "CVE-2020-12723",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-12723"
    },
    {
      "cve": "CVE-2020-12762",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-12762"
    },
    {
      "cve": "CVE-2020-13434",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13434"
    },
    {
      "cve": "CVE-2020-13435",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13435"
    },
    {
      "cve": "CVE-2020-13529",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13529"
    },
    {
      "cve": "CVE-2020-13630",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13630"
    },
    {
      "cve": "CVE-2020-13631",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13631"
    },
    {
      "cve": "CVE-2020-13632",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13632"
    },
    {
      "cve": "CVE-2020-13776",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13776"
    },
    {
      "cve": "CVE-2020-13777",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13777"
    },
    {
      "cve": "CVE-2020-13871",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-13871"
    },
    {
      "cve": "CVE-2020-14145",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-14422",
      "cwe": {
        "id": "CWE-682",
        "name": "Incorrect Calculation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-14422"
    },
    {
      "cve": "CVE-2020-15358",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-15358"
    },
    {
      "cve": "CVE-2020-15523",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-15523"
    },
    {
      "cve": "CVE-2020-15778",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-15778"
    },
    {
      "cve": "CVE-2020-15801",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-15801"
    },
    {
      "cve": "CVE-2020-19185",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19185"
    },
    {
      "cve": "CVE-2020-19186",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19186"
    },
    {
      "cve": "CVE-2020-19187",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19187"
    },
    {
      "cve": "CVE-2020-19188",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19188"
    },
    {
      "cve": "CVE-2020-19189",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19189"
    },
    {
      "cve": "CVE-2020-19190",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19190"
    },
    {
      "cve": "CVE-2020-19909",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-19909"
    },
    {
      "cve": "CVE-2020-21047",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-21047"
    },
    {
      "cve": "CVE-2020-21913",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-21913"
    },
    {
      "cve": "CVE-2020-22218",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-22218"
    },
    {
      "cve": "CVE-2020-24659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-24659"
    },
    {
      "cve": "CVE-2020-24977",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-24977"
    },
    {
      "cve": "CVE-2020-25692",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-25692"
    },
    {
      "cve": "CVE-2020-25709",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-25709"
    },
    {
      "cve": "CVE-2020-25710",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-25710"
    },
    {
      "cve": "CVE-2020-26116",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-26116"
    },
    {
      "cve": "CVE-2020-27618",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-27618"
    },
    {
      "cve": "CVE-2020-28196",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-28196"
    },
    {
      "cve": "CVE-2020-29361",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-29361"
    },
    {
      "cve": "CVE-2020-29362",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-29362"
    },
    {
      "cve": "CVE-2020-29363",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-29363"
    },
    {
      "cve": "CVE-2020-29562",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-29562"
    },
    {
      "cve": "CVE-2020-29573",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-29573"
    },
    {
      "cve": "CVE-2020-35525",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-35525"
    },
    {
      "cve": "CVE-2020-35527",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-35527"
    },
    {
      "cve": "CVE-2020-36221",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36221"
    },
    {
      "cve": "CVE-2020-36222",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36222"
    },
    {
      "cve": "CVE-2020-36223",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36223"
    },
    {
      "cve": "CVE-2020-36224",
      "cwe": {
        "id": "CWE-763",
        "name": "Release of Invalid Pointer or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36224"
    },
    {
      "cve": "CVE-2020-36225",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36225"
    },
    {
      "cve": "CVE-2020-36226",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36226"
    },
    {
      "cve": "CVE-2020-36227",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36227"
    },
    {
      "cve": "CVE-2020-36228",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36228"
    },
    {
      "cve": "CVE-2020-36229",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36229"
    },
    {
      "cve": "CVE-2020-36230",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2020-36230"
    },
    {
      "cve": "CVE-2021-3177",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-3326",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3326"
    },
    {
      "cve": "CVE-2021-3426",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3426"
    },
    {
      "cve": "CVE-2021-3516",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3516"
    },
    {
      "cve": "CVE-2021-3517",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3517"
    },
    {
      "cve": "CVE-2021-3518",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3518"
    },
    {
      "cve": "CVE-2021-3520",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3520"
    },
    {
      "cve": "CVE-2021-3537",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3537"
    },
    {
      "cve": "CVE-2021-3541",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3541"
    },
    {
      "cve": "CVE-2021-3580",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3580"
    },
    {
      "cve": "CVE-2021-3733",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3826",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3826"
    },
    {
      "cve": "CVE-2021-3997",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3997"
    },
    {
      "cve": "CVE-2021-3998",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3998"
    },
    {
      "cve": "CVE-2021-3999",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-3999"
    },
    {
      "cve": "CVE-2021-4122",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-4122"
    },
    {
      "cve": "CVE-2021-4189",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-4189"
    },
    {
      "cve": "CVE-2021-4209",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-4209"
    },
    {
      "cve": "CVE-2021-20193",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-20193"
    },
    {
      "cve": "CVE-2021-20227",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-20227"
    },
    {
      "cve": "CVE-2021-20231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-20231"
    },
    {
      "cve": "CVE-2021-20232",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-20232"
    },
    {
      "cve": "CVE-2021-20305",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-20305"
    },
    {
      "cve": "CVE-2021-22876",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22876"
    },
    {
      "cve": "CVE-2021-22890",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22890"
    },
    {
      "cve": "CVE-2021-22897",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22897"
    },
    {
      "cve": "CVE-2021-22898",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22898"
    },
    {
      "cve": "CVE-2021-22901",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22901"
    },
    {
      "cve": "CVE-2021-22922",
      "cwe": {
        "id": "CWE-354",
        "name": "Improper Validation of Integrity Check Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22922"
    },
    {
      "cve": "CVE-2021-22923",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22923"
    },
    {
      "cve": "CVE-2021-22924",
      "cwe": {
        "id": "CWE-706",
        "name": "Use of Incorrectly-Resolved Name or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22924"
    },
    {
      "cve": "CVE-2021-22925",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22925"
    },
    {
      "cve": "CVE-2021-22926",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-22945",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22945"
    },
    {
      "cve": "CVE-2021-22946",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22946"
    },
    {
      "cve": "CVE-2021-22947",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-22947"
    },
    {
      "cve": "CVE-2021-23336",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-23336"
    },
    {
      "cve": "CVE-2021-27212",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-27212"
    },
    {
      "cve": "CVE-2021-27218",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-27218"
    },
    {
      "cve": "CVE-2021-27219",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-27645",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-27645"
    },
    {
      "cve": "CVE-2021-28041",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-28041"
    },
    {
      "cve": "CVE-2021-28153",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-28153"
    },
    {
      "cve": "CVE-2021-28363",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-28363"
    },
    {
      "cve": "CVE-2021-28861",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-31239",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-31239"
    },
    {
      "cve": "CVE-2021-32292",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-32292"
    },
    {
      "cve": "CVE-2021-33294",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-33294"
    },
    {
      "cve": "CVE-2021-33560",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-33560"
    },
    {
      "cve": "CVE-2021-33574",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-33574"
    },
    {
      "cve": "CVE-2021-33910",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-33910"
    },
    {
      "cve": "CVE-2021-35942",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-35942"
    },
    {
      "cve": "CVE-2021-36084",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36084"
    },
    {
      "cve": "CVE-2021-36085",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36085"
    },
    {
      "cve": "CVE-2021-36086",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36086"
    },
    {
      "cve": "CVE-2021-36087",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36087"
    },
    {
      "cve": "CVE-2021-36222",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36222"
    },
    {
      "cve": "CVE-2021-36690",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-36690"
    },
    {
      "cve": "CVE-2021-37600",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-37600"
    },
    {
      "cve": "CVE-2021-37750",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-37750"
    },
    {
      "cve": "CVE-2021-38604",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-38604"
    },
    {
      "cve": "CVE-2021-43396",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-43396"
    },
    {
      "cve": "CVE-2021-43618",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-43618"
    },
    {
      "cve": "CVE-2021-44879",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-44879"
    },
    {
      "cve": "CVE-2021-45960",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2021-46195",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-46195"
    },
    {
      "cve": "CVE-2021-46828",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0391",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0563",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-0563"
    },
    {
      "cve": "CVE-2022-0778",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-1271",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1292",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1292"
    },
    {
      "cve": "CVE-2022-1304",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1343",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1343"
    },
    {
      "cve": "CVE-2022-1434",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1434"
    },
    {
      "cve": "CVE-2022-1473",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-1473"
    },
    {
      "cve": "CVE-2022-2068",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-2097",
      "cwe": {
        "id": "CWE-326",
        "name": "Inadequate Encryption Strength"
      },
      "notes": [
        {
          "category": "summary",
          "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-2097"
    },
    {
      "cve": "CVE-2022-2274",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-2274"
    },
    {
      "cve": "CVE-2022-2509",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-3715",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3821",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-4304",
      "cwe": {
        "id": "CWE-326",
        "name": "Inadequate Encryption Strength"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Disable the use of RSA ciphers in the web server configuration; note that RSA ciphers are disabled by default",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Do not import or configure certificate files in PEM format from untrusted sources",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-22576",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-22822",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23218",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-23218"
    },
    {
      "cve": "CVE-2022-23219",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-23219"
    },
    {
      "cve": "CVE-2022-23308",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-23308"
    },
    {
      "cve": "CVE-2022-23852",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23990",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "cwe": {
        "id": "CWE-89",
        "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26488",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-26488"
    },
    {
      "cve": "CVE-2022-27774",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27778",
      "cwe": {
        "id": "CWE-706",
        "name": "Use of Incorrectly-Resolved Name or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27778"
    },
    {
      "cve": "CVE-2022-27779",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27779"
    },
    {
      "cve": "CVE-2022-27780",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27780"
    },
    {
      "cve": "CVE-2022-27781",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-27943",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-27943"
    },
    {
      "cve": "CVE-2022-28321",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-28321"
    },
    {
      "cve": "CVE-2022-29155",
      "cwe": {
        "id": "CWE-89",
        "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-29155"
    },
    {
      "cve": "CVE-2022-29824",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-29824"
    },
    {
      "cve": "CVE-2022-30115",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-30115"
    },
    {
      "cve": "CVE-2022-32205",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-35260",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-35260"
    },
    {
      "cve": "CVE-2022-35737",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-37434",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37454",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-37454"
    },
    {
      "cve": "CVE-2022-40303",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40674",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-42898",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42915",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-43680",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-45061",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46908",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-46908"
    },
    {
      "cve": "CVE-2022-48303",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48522",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-48522"
    },
    {
      "cve": "CVE-2022-48560",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2022-48560"
    },
    {
      "cve": "CVE-2023-0215",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0286",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Disable CRL (certification revocation list) checking, if possible",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0361",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0464",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\r\nimplicitly enable the certificate policy check when doing certificate\r\nverification. However the implementation of the function does not\r\nenable the check which allows certificates with invalid or incorrect\r\npolicies to pass the certificate verification.\r\n\r\nAs suddenly enabling the policy check could break existing deployments it was\r\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\r\nfunction.\r\n\r\nInstead the applications that require OpenSSL to perform certificate\r\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\r\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\r\nthe X509_V_FLAG_POLICY_CHECK flag argument.\r\n\r\nCertificate policy checks are disabled by default in OpenSSL and are not\r\ncommonly used by applications.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0687",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-0687"
    },
    {
      "cve": "CVE-2023-1077",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-1077"
    },
    {
      "cve": "CVE-2023-1206",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-1206"
    },
    {
      "cve": "CVE-2023-2650",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-2650"
    },
    {
      "cve": "CVE-2023-2953",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3212",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3212"
    },
    {
      "cve": "CVE-2023-3446",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-3609",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3609"
    },
    {
      "cve": "CVE-2023-3611",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-3772",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3772"
    },
    {
      "cve": "CVE-2023-3817",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4016",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4016"
    },
    {
      "cve": "CVE-2023-4039",
      "cwe": {
        "id": "CWE-693",
        "name": "Protection Mechanism Failure"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4039"
    },
    {
      "cve": "CVE-2023-4623",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4623"
    },
    {
      "cve": "CVE-2023-4807",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4813",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4813"
    },
    {
      "cve": "CVE-2023-4921",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-4921"
    },
    {
      "cve": "CVE-2023-5156",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5156"
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5981",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-5981"
    },
    {
      "cve": "CVE-2023-6121",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6121"
    },
    {
      "cve": "CVE-2023-6817",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6817"
    },
    {
      "cve": "CVE-2023-6931",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6931"
    },
    {
      "cve": "CVE-2023-6932",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-6932"
    },
    {
      "cve": "CVE-2023-23914",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-24329",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25136",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-25136"
    },
    {
      "cve": "CVE-2023-25139",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-25139"
    },
    {
      "cve": "CVE-2023-26604",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-26604"
    },
    {
      "cve": "CVE-2023-27371",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27371"
    },
    {
      "cve": "CVE-2023-27533",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27537",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27537"
    },
    {
      "cve": "CVE-2023-27538",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28484",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-28484"
    },
    {
      "cve": "CVE-2023-29383",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-29383"
    },
    {
      "cve": "CVE-2023-29469",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-29469"
    },
    {
      "cve": "CVE-2023-29491",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-29491"
    },
    {
      "cve": "CVE-2023-29499",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-29499"
    },
    {
      "cve": "CVE-2023-31085",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-31085"
    },
    {
      "cve": "CVE-2023-32611",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-32611"
    },
    {
      "cve": "CVE-2023-32636",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-32636"
    },
    {
      "cve": "CVE-2023-32643",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-32643"
    },
    {
      "cve": "CVE-2023-32665",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "mitigation",
          "details": "Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. Note that this is the default configuration, which therefore limits the exploitability to local attacks only.",
          "product_ids": [
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-32665"
    },
    {
      "cve": "CVE-2023-34319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece.  Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together.  Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-34319"
    },
    {
      "cve": "CVE-2023-34969",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35945",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-35945"
    },
    {
      "cve": "CVE-2023-38408",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-39128",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39128"
    },
    {
      "cve": "CVE-2023-39189",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39189"
    },
    {
      "cve": "CVE-2023-39192",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39192"
    },
    {
      "cve": "CVE-2023-39193",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39193"
    },
    {
      "cve": "CVE-2023-39194",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39194"
    },
    {
      "cve": "CVE-2023-39615",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-39615"
    },
    {
      "cve": "CVE-2023-40283",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-40283"
    },
    {
      "cve": "CVE-2023-42754",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-42754"
    },
    {
      "cve": "CVE-2023-42755",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-42755"
    },
    {
      "cve": "CVE-2023-45322",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45853",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-45853"
    },
    {
      "cve": "CVE-2023-45871",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-45898",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-45898"
    },
    {
      "cve": "CVE-2023-45918",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-45918"
    },
    {
      "cve": "CVE-2023-46862",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-46862"
    },
    {
      "cve": "CVE-2023-52425",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-52444",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid dirent corruption As Al reported in link[1]: f2fs_rename() ... if (old_dir != new_dir \u0026\u0026 !whiteout) f2fs_set_link(old_inode, old_dir_entry, old_dir_page, new_dir); else f2fs_put_page(old_dir_page, 0); You want correct inumber in the \"..\" link. And cross-directory rename does move the source to new parent, even if you\u0027d been asked to leave a whiteout in the old place. [1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/ With below testcase, it may cause dirent corruption, due to it missed to call f2fs_set_link() to update \"..\" link to new directory. - mkdir -p dir/foo - renameat2 -w dir/foo bar [ASSERT] (__chk_dots_dentries:1421) --\u003e Bad inode number[0x4] for \u0027..\u0027, parent parent ino is [0x3] [FSCK] other corrupted bugs [Fail]",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52444"
    },
    {
      "cve": "CVE-2023-52464",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027: drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ]",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52464"
    },
    {
      "cve": "CVE-2023-52612",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: crypto: scomp - fix req-\u003edst buffer overflow The req-\u003edst buffer size should be checked before copying from the scomp_scratch-\u003edst to avoid req-\u003edst buffer overflow problem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52612"
    },
    {
      "cve": "CVE-2023-52622",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52622"
    },
    {
      "cve": "CVE-2023-52675",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52675"
    },
    {
      "cve": "CVE-2023-52699",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sysv: don\u0027t call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A \"write_lock(\u0026pointers_lock) =\u003e read_lock(\u0026pointers_lock) deadlock\" bug and a \"sb_bread() with write_lock(\u0026pointers_lock)\" bug were introduced by \"Replace BKL for chain locking with sysvfs-private rwlock\" in Linux 2.5.12. Then, \"[PATCH] err1-40: sysvfs locking fix\" in Linux 2.6.8 fixed the former bug by moving pointers_lock lock to the callers, but instead introduced a \"sb_bread() with read_lock(\u0026pointers_lock)\" bug (which made this problem easier to hit). Al Viro suggested that why not to do like get_branch()/get_block()/ find_shared() in Minix filesystem does. And doing like that is almost a revert of \"[PATCH] err1-40: sysvfs locking fix\" except that get_branch() from with find_shared() is called without write_lock(\u0026pointers_lock).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2023-52699"
    },
    {
      "cve": "CVE-2024-0584",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-0584"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2236",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing-based side-channel flaw was found in libgcrypt\u0027s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2236"
    },
    {
      "cve": "CVE-2024-2379",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2379"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-297",
        "name": "Improper Validation of Certificate with Host Mismatch"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS.  libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-2511",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-5742",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-5742"
    },
    {
      "cve": "CVE-2024-6409",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition vulnerability was discovered in how signals are handled by OpenSSH\u0027s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd\u0027s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-6409"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-8096",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than \u0027revoked\u0027 (like for example \u0027unauthorized\u0027) it is not treated as a bad certficate.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-8096"
    },
    {
      "cve": "CVE-2024-8176",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-8176"
    },
    {
      "cve": "CVE-2024-9143",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-9143"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-26645",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26645"
    },
    {
      "cve": "CVE-2024-26671",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26671"
    },
    {
      "cve": "CVE-2024-26679",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26679"
    },
    {
      "cve": "CVE-2024-26772",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26772"
    },
    {
      "cve": "CVE-2024-26773",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26777",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26777"
    },
    {
      "cve": "CVE-2024-26805",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26805"
    },
    {
      "cve": "CVE-2024-26835",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26835"
    },
    {
      "cve": "CVE-2024-26863",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26863"
    },
    {
      "cve": "CVE-2024-26878",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26878"
    },
    {
      "cve": "CVE-2024-26880",
      "cwe": {
        "id": "CWE-99",
        "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26880"
    },
    {
      "cve": "CVE-2024-26898",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26901",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26901"
    },
    {
      "cve": "CVE-2024-26923",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26923"
    },
    {
      "cve": "CVE-2024-26957",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix reference counting on zcrypt card objects.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26973",
      "cwe": {
        "id": "CWE-457",
        "name": "Use of Uninitialized Variable"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must be a multiple of 4 so the file handle is actually 12 bytes long and the last two bytes remain uninitialized. This is not great at we potentially leak uninitialized information with the handle to userspace. Properly initialize the full handle length.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-26973"
    },
    {
      "cve": "CVE-2024-27020",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-27020"
    },
    {
      "cve": "CVE-2024-27032",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid potential panic during recovery During recovery, if FAULT_BLOCK is on, it is possible that f2fs_reserve_new_block() will return -ENOSPC during recovery, then it may trigger panic. Also, if fault injection rate is 1 and only FAULT_BLOCK fault type is on, it may encounter deadloop in loop of block reservation. Let\u0027s change as below to fix these issues: - remove bug_on() to avoid panic. - limit the loop count of block reservation to avoid potential deadloop.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-27032"
    },
    {
      "cve": "CVE-2024-27065",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-27065"
    },
    {
      "cve": "CVE-2024-27074",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: go7007: fix a memleak in go7007_load_encoder.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-27074"
    },
    {
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28757",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28757"
    },
    {
      "cve": "CVE-2024-28834",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-28835",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-28835"
    },
    {
      "cve": "CVE-2024-33621",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-33621"
    },
    {
      "cve": "CVE-2024-34459",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-34459"
    },
    {
      "cve": "CVE-2024-35807",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35807"
    },
    {
      "cve": "CVE-2024-35809",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35830",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35888",
      "cwe": {
        "id": "CWE-457",
        "name": "Use of Uninitialized Variable"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb-\u003ehead.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35888"
    },
    {
      "cve": "CVE-2024-35910",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed, we call inet_csk_clear_xmit_timers() to \u0027stop\u0027 the timers. inet_csk_clear_xmit_timers() can be called from any context, including when socket lock is held. This is the reason it uses sk_stop_timer(), aka del_timer(). This means that ongoing timers might finish much later. For user sockets, this is fine because each running timer holds a reference on the socket, and the user socket holds a reference on the netns. For kernel sockets, we risk that the netns is freed before timer can complete, because kernel sockets do not hold reference on the netns. This patch adds inet_csk_clear_xmit_timers_sync() function that using sk_stop_timer_sync() to make sure all timers are terminated before the kernel socket is released. Modules using kernel sockets close them in their netns exit() handler. Also add sock_not_owned_by_me() helper to get LOCKDEP support : inet_csk_clear_xmit_timers_sync() must not be called while socket lock is held. It is very possible we can revert in the future commit 3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\") which attempted to solve the issue in rds only. (net/smc/af_smc.c and net/mptcp/subflow.c have similar code) We probably can remove the check_net() tests from tcp_out_of_resources() and __tcp_close() in the future.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35910"
    },
    {
      "cve": "CVE-2024-35925",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block: prevent division by zero in blk_rq_stat_sum()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35925"
    },
    {
      "cve": "CVE-2024-35944",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-36017",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36017"
    },
    {
      "cve": "CVE-2024-36286",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36286"
    },
    {
      "cve": "CVE-2024-36484",
      "cwe": {
        "id": "CWE-99",
        "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36484"
    },
    {
      "cve": "CVE-2024-36904",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36904"
    },
    {
      "cve": "CVE-2024-36905",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36905"
    },
    {
      "cve": "CVE-2024-36934",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bna: ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf. Fix this issue by using memdup_user_nul instead of memdup_user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-36934"
    },
    {
      "cve": "CVE-2024-37356",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-37356"
    },
    {
      "cve": "CVE-2024-38596",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-38596"
    },
    {
      "cve": "CVE-2024-38598",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-38598"
    },
    {
      "cve": "CVE-2024-38612",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-38612"
    },
    {
      "cve": "CVE-2024-38621",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The -\u003elength is the length of the buffer. The -\u003ebytesused is how many bytes we have copied thus far. When the condition is reversed that means the result of the subtraction is always negative but since it\u0027s unsigned then the result is a very high positive value. That means the overflow check is never true. Additionally, the -\u003ebytesused doesn\u0027t actually work for this purpose because we\u0027re not writing to \"buf-\u003emem + buf-\u003ebytesused\". Instead, the math to calculate the destination where we are writing is a bit involved. You calculate the number of full lines already written, multiply by two, skip a line if necessary so that we start on an odd numbered line, and add the offset into the line. To fix this buffer overflow, just take the actual destination where we are writing, if the offset is already out of bounds print an error and return. Otherwise, write up to buf-\u003elength bytes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-38621"
    },
    {
      "cve": "CVE-2024-38780",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-38780"
    },
    {
      "cve": "CVE-2024-39292",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that happens, register_winch_irq() adds to that list a winch that is scheduled to be (or has already been) freed, causing a panic later in winch_cleanup(). Avoid the race by adding the winch to the winch_handlers list before registering the IRQ, and rolling back if um_request_irq() fails.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-39292"
    },
    {
      "cve": "CVE-2024-39469",
      "cwe": {
        "id": "CWE-1050",
        "name": "Excessive Platform Resource Consumption within a Loop"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directory as empty and corrupt the file system. In addition, since nilfs_empty_dir() does not immediately return on a failed folio/page read, but continues to loop, this can cause a long loop with I/O if i_size of the directory\u0027s inode is also corrupted, causing the log writer thread to wait and hang, as reported by syzbot. Fix these issues by making nilfs_empty_dir() immediately return a false value (0) if it fails to get a directory folio/page.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-39469"
    },
    {
      "cve": "CVE-2024-39487",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-39487"
    },
    {
      "cve": "CVE-2024-39489",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-39489"
    },
    {
      "cve": "CVE-2024-40901",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-40901"
    },
    {
      "cve": "CVE-2024-40959",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-40959"
    },
    {
      "cve": "CVE-2024-41046",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-41046"
    },
    {
      "cve": "CVE-2024-42070",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-42070"
    },
    {
      "cve": "CVE-2024-42096",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-42096"
    },
    {
      "cve": "CVE-2024-42106",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-42106"
    },
    {
      "cve": "CVE-2024-42131",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirty_bytes / dirty_background_bytes interfaces we can just refuse to set so large limits. For dirty_ratio / dirty_background_ratio it isn\u0027t so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don\u0027t allow the result to exceed UINT_MAX. This is root-only triggerable problem which occurs when the operator sets dirty limits to \u003e16 TB.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-42131"
    },
    {
      "cve": "CVE-2024-42154",
      "cwe": {
        "id": "CWE-805",
        "name": "Buffer Access with Incorrect Length Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-42154"
    },
    {
      "cve": "CVE-2024-43871",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-43871"
    },
    {
      "cve": "CVE-2024-44944",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-44944"
    },
    {
      "cve": "CVE-2024-44965",
      "cwe": {
        "id": "CWE-229",
        "name": "Improper Handling of Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a \u0027short\u0027 clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-44965"
    },
    {
      "cve": "CVE-2024-46743",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-46743"
    },
    {
      "cve": "CVE-2024-46745",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-46745"
    },
    {
      "cve": "CVE-2024-46750",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-46750"
    },
    {
      "cve": "CVE-2024-47684",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-47684"
    },
    {
      "cve": "CVE-2024-47701",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-47701"
    },
    {
      "cve": "CVE-2024-47707",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: A NULL dereference vulnerability may occur in rt6_uncached_list_flush_dev() due to the necessary check being removed by a previous commit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-47707"
    },
    {
      "cve": "CVE-2024-47737",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-47737"
    },
    {
      "cve": "CVE-2024-48881",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-48881"
    },
    {
      "cve": "CVE-2024-49881",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49881"
    },
    {
      "cve": "CVE-2024-49884",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49884"
    },
    {
      "cve": "CVE-2024-49948",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49948"
    },
    {
      "cve": "CVE-2024-49949",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49949"
    },
    {
      "cve": "CVE-2024-49952",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49952"
    },
    {
      "cve": "CVE-2024-49982",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb-\u003edev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb-\u003edev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49982"
    },
    {
      "cve": "CVE-2024-49997",
      "cwe": {
        "id": "CWE-226",
        "name": "Sensitive Information in Resource Not Removed Before Reuse"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-49997"
    },
    {
      "cve": "CVE-2024-50006",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50006"
    },
    {
      "cve": "CVE-2024-50040",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50040"
    },
    {
      "cve": "CVE-2024-50045",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50045"
    },
    {
      "cve": "CVE-2024-50251",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50251"
    },
    {
      "cve": "CVE-2024-50262",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50262"
    },
    {
      "cve": "CVE-2024-50299",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50299"
    },
    {
      "cve": "CVE-2024-50301",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50301"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-52332",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "igb: Fix potential invalid memory access in igb_init_module() The pci_register_driver() can fail and when this happened, the dca_notifier needs to be unregistered, otherwise the dca_notifier can be called when igb fails to install, resulting to invalid memory access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-52332"
    },
    {
      "cve": "CVE-2024-52533",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing \u0027\\\\0\u0027 character.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-52533"
    },
    {
      "cve": "CVE-2024-53057",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53057"
    },
    {
      "cve": "CVE-2024-53124",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: fix data-races around sk sk_forward_alloc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53124"
    },
    {
      "cve": "CVE-2024-53140",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative dumping of data. It provides the families the following ops: - start - (optional) kicks off the dumping process - dump - actual dump helper, keeps getting called until it returns 0 - done - (optional) pairs with .start, can be used for cleanup The whole process is asynchronous and the repeated calls to .dump don\u0027t actually happen in a tight loop, but rather are triggered in response to recvmsg() on the socket. This gives the user full control over the dump, but also means that the user can close the socket without getting to the end of the dump. To make sure .start is always paired with .done we check if there is an ongoing dump before freeing the socket, and if so call .done. The complication is that sockets can get freed from BH and .done is allowed to sleep. So we use a workqueue to defer the call, when needed. Unfortunately this does not work correctly. What we defer is not the cleanup but rather releasing a reference on the socket. We have no guarantee that we own the last reference, if someone else holds the socket they may release it in BH and we\u0027re back to square one. The whole dance, however, appears to be unnecessary. Only the user can interact with dumps, so we can clean up when socket is closed. And close always happens in process context. Some async code may still access the socket after close, queue notification skbs to it etc. but no dumps can start, end or otherwise make progress. Delete the workqueue and flush the dump state directly from the release handler. Note that further cleanup is possible in -next, for instance we now always call .done before releasing the main module reference, so dump doesn\u0027t have to take a reference of its own.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53140"
    },
    {
      "cve": "CVE-2024-53164",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch-\u003eq.qlen around qdisc_tree_reduce_backlog() need to happen _before_ a call to said function because otherwise it may fail to notify parent qdiscs when the child is about to become empty.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53164"
    },
    {
      "cve": "CVE-2024-53165",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let\u0027s only add it to the list after everything has succeeded.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53165"
    },
    {
      "cve": "CVE-2024-53217",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-53217"
    },
    {
      "cve": "CVE-2024-56433",
      "cwe": {
        "id": "CWE-1188",
        "name": "Initialization of a Resource with an Insecure Default"
      },
      "notes": [
        {
          "category": "summary",
          "text": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56433"
    },
    {
      "cve": "CVE-2024-56569",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56569"
    },
    {
      "cve": "CVE-2024-56570",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function.This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56570"
    },
    {
      "cve": "CVE-2024-56600",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56600"
    },
    {
      "cve": "CVE-2024-56601",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56601"
    },
    {
      "cve": "CVE-2024-56606",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56606"
    },
    {
      "cve": "CVE-2024-56644",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56644"
    },
    {
      "cve": "CVE-2024-56650",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56650"
    },
    {
      "cve": "CVE-2024-56770",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net/sched: netem: The interface fully stops transferring packets and \"locks\". In this case, the child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at its limit and no more packets are accepted.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2024-56779",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\r\n\r\nThe action force umount(umount -f) will attempt to kill all rpc_task even\r\numount operation may ultimately fail if some files remain open.\r\nConsequently, if an action attempts to open a file, it can potentially\r\nsend two rpc_task to nfs server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56779"
    },
    {
      "cve": "CVE-2024-56780",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-56780"
    },
    {
      "cve": "CVE-2024-57884",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()\r\n\r\nThe task sometimes continues looping in throttle_direct_reclaim() because\r\nallow_direct_reclaim(pgdat) keeps returning false.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57884"
    },
    {
      "cve": "CVE-2024-57901",
      "cwe": {
        "id": "CWE-664",
        "name": "Improper Control of a Resource Through its Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "af_packet: vlan_get_protocol_dgram() vs MSG_PEEK Blamed allowing a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2024-57901"
    },
    {
      "cve": "CVE-2025-0167",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When asked to use a .netrc file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a default entry that omits both login and password. A rare circumstance.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-0167"
    },
    {
      "cve": "CVE-2025-0395",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-0395"
    },
    {
      "cve": "CVE-2025-0665",
      "cwe": {
        "id": "CWE-1341",
        "name": "Multiple Releases of Same Resource or Handle"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-0665"
    },
    {
      "cve": "CVE-2025-0725",
      "cwe": {
        "id": "CWE-680",
        "name": "Integer Overflow to Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-0725"
    },
    {
      "cve": "CVE-2025-1390",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The PAM module pam_cap.so of libcap configuration supports group names starting with \u201c@\u201d, during actual parsing, configurations not starting with \u201c@\u201d are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-1390"
    },
    {
      "cve": "CVE-2025-3277",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow can be triggered in SQLite\u0027s \u0027concat_ws()\u0027 function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size 4GB can be triggered. This can result in arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-3277"
    },
    {
      "cve": "CVE-2025-3360",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "1. Describe what is the vulnerability about, e.g.:\n    Affected devices do not properly validate input in the hack-me endpoint of the web service.\n\n    2. Describe what an attacker could do with it - e.g.:\n    This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0.0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-3360"
    },
    {
      "cve": "CVE-2025-21694",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "fs/proc: softlockup in __read_vmcore",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-21694"
    },
    {
      "cve": "CVE-2025-26466",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-26466"
    },
    {
      "cve": "CVE-2025-29087",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-29087"
    },
    {
      "cve": "CVE-2025-29088",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability in sqlite allows an attacker to cause a denial of service via the SQLITE_DBCONFIG_LOOKASIDE component.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-29088"
    },
    {
      "cve": "CVE-2025-32728",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "1",
          "2",
          "3",
          "4",
          "5"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "1",
            "2",
            "3",
            "4",
            "5"
          ]
        }
      ],
      "title": "CVE-2025-32728"
    }
  ]
}
  CERTFR-2025-AVI-0150
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Identity Exposure. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.9 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.9",
      "product": {
        "name": "Identity Exposure",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-1091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2025-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-02-21T00:00:00",
  "last_revision_date": "2025-02-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0150",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Identity Exposure. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Identity Exposure",
  "vendor_advisories": [
    {
      "published_at": "2025-02-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
      "url": "https://www.tenable.com/security/tns-2025-01"
    }
  ]
}
  CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 | 
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
      "product": {
        "name": "Tanzu Application Service",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
      "product": {
        "name": "Tanzu Application Service",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2020-8908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2022-30633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
    },
    {
      "name": "CVE-2022-1705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
    },
    {
      "name": "CVE-2022-27664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
    },
    {
      "name": "CVE-2022-28131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
    },
    {
      "name": "CVE-2022-32148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
    },
    {
      "name": "CVE-2022-32189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
    },
    {
      "name": "CVE-2022-1962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
    },
    {
      "name": "CVE-2022-30635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
    },
    {
      "name": "CVE-2022-32149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
    },
    {
      "name": "CVE-2022-30631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
    },
    {
      "name": "CVE-2022-30632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
    },
    {
      "name": "CVE-2022-30630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-29526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2022-24921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
    },
    {
      "name": "CVE-2022-1434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2022-27774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
    },
    {
      "name": "CVE-2022-27775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2022-27776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2022-27191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
    },
    {
      "name": "CVE-2022-2097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
    },
    {
      "name": "CVE-2022-25647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
    },
    {
      "name": "CVE-2022-28327",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
    },
    {
      "name": "CVE-2022-24675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2022-32221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
    },
    {
      "name": "CVE-2022-42916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-42915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2022-43552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
    },
    {
      "name": "CVE-2022-4304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
    },
    {
      "name": "CVE-2022-4203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2023-23915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
    },
    {
      "name": "CVE-2023-23914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
    },
    {
      "name": "CVE-2023-23916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
    },
    {
      "name": "CVE-2022-41717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2022-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
    },
    {
      "name": "CVE-2022-41715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
    },
    {
      "name": "CVE-2022-2880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
    },
    {
      "name": "CVE-2022-41716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
    },
    {
      "name": "CVE-2023-0466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
    },
    {
      "name": "CVE-2023-0465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
    },
    {
      "name": "CVE-2022-30629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
    },
    {
      "name": "CVE-2022-41723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
    },
    {
      "name": "CVE-2022-41722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
    },
    {
      "name": "CVE-2022-30580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
    },
    {
      "name": "CVE-2022-41720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
    },
    {
      "name": "CVE-2022-41725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
    },
    {
      "name": "CVE-2022-41724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
    },
    {
      "name": "CVE-2023-24532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
    },
    {
      "name": "CVE-2023-24537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
    },
    {
      "name": "CVE-2023-2650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
    },
    {
      "name": "CVE-2022-30634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2022-27780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
    },
    {
      "name": "CVE-2022-29804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
    },
    {
      "name": "CVE-2023-24536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
    },
    {
      "name": "CVE-2023-24538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
    },
    {
      "name": "CVE-2023-1255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-24540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
    },
    {
      "name": "CVE-2023-29400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
    },
    {
      "name": "CVE-2023-24539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
    },
    {
      "name": "CVE-2023-2975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
    },
    {
      "name": "CVE-2023-3446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
    },
    {
      "name": "CVE-2023-28319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
    },
    {
      "name": "CVE-2023-3817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
    },
    {
      "name": "CVE-2023-29404",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
    },
    {
      "name": "CVE-2023-29402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
    },
    {
      "name": "CVE-2023-29403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
    },
    {
      "name": "CVE-2023-29405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
    },
    {
      "name": "CVE-2023-2976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
    },
    {
      "name": "CVE-2023-29409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
    },
    {
      "name": "CVE-2023-29406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2023-33201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2022-0563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-39323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
    },
    {
      "name": "CVE-2023-36617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
    },
    {
      "name": "CVE-2022-23471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
    },
    {
      "name": "CVE-2023-25153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
    },
    {
      "name": "CVE-2023-24534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-39318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
    },
    {
      "name": "CVE-2023-39319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2023-25173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
    },
    {
      "name": "CVE-2022-31030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2023-2253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
    },
    {
      "name": "CVE-2024-25710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
    },
    {
      "name": "CVE-2024-26308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-21011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
    },
    {
      "name": "CVE-2024-21094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
    },
    {
      "name": "CVE-2024-21068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
    },
    {
      "name": "CVE-2024-21085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
    },
    {
      "name": "CVE-2024-21012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
    },
    {
      "name": "CVE-2023-28841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
    },
    {
      "name": "CVE-2023-28842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
    },
    {
      "name": "CVE-2023-39326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
    },
    {
      "name": "CVE-2023-45283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
    },
    {
      "name": "CVE-2023-28840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
    },
    {
      "name": "CVE-2023-45285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
    },
    {
      "name": "CVE-2023-45284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2023-45289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
    },
    {
      "name": "CVE-2023-45290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
    },
    {
      "name": "CVE-2024-24783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
    },
    {
      "name": "CVE-2024-24784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
    },
    {
      "name": "CVE-2024-24785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2024-35255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
    },
    {
      "name": "CVE-2024-24557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
    },
    {
      "name": "CVE-2024-24786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-4030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-21131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
    },
    {
      "name": "CVE-2024-21138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
    },
    {
      "name": "CVE-2024-21140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
    },
    {
      "name": "CVE-2024-21144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
    },
    {
      "name": "CVE-2024-21145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
    },
    {
      "name": "CVE-2024-21147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
    },
    {
      "name": "CVE-2023-28756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2023-45287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
    },
    {
      "name": "CVE-2024-24787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2022-24769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
    },
    {
      "name": "CVE-2024-41110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-24789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
    },
    {
      "name": "CVE-2024-34155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
    },
    {
      "name": "CVE-2024-34156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
    },
    {
      "name": "CVE-2024-34158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2024-24790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
    },
    {
      "name": "CVE-2024-21208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
    },
    {
      "name": "CVE-2024-21210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
    },
    {
      "name": "CVE-2024-21217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
    },
    {
      "name": "CVE-2024-21235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-47554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-0406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2025-21502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
    },
    {
      "name": "CVE-2024-27282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2024-24791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
    },
    {
      "name": "CVE-2025-22228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
    },
    {
      "name": "CVE-2023-24531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
    },
    {
      "name": "CVE-2024-45336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2024-45341",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
    },
    {
      "name": "CVE-2025-22866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2020-36843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
    },
    {
      "name": "CVE-2025-21587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
    },
    {
      "name": "CVE-2025-30691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
    },
    {
      "name": "CVE-2025-30698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2020-15250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2024-12801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
    },
    {
      "name": "CVE-2024-29018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
    },
    {
      "name": "CVE-2025-21613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
    },
    {
      "name": "CVE-2025-21614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-31650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
    },
    {
      "name": "CVE-2025-31651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-4575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-4517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
    },
    {
      "name": "CVE-2025-4330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
    },
    {
      "name": "CVE-2025-4138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
    },
    {
      "name": "CVE-2024-12718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
    },
    {
      "name": "CVE-2025-4435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
    },
    {
      "name": "CVE-2025-41234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2025-27219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
    },
    {
      "name": "CVE-2025-27220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
    },
    {
      "name": "CVE-2025-48976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2022-21698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-52434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2024-47081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-30754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
    },
    {
      "name": "CVE-2025-30761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2021-3995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
    },
    {
      "name": "CVE-2021-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
    },
    {
      "name": "CVE-2022-28948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
    },
    {
      "name": "CVE-2022-29173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
    },
    {
      "name": "CVE-2022-35929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
    },
    {
      "name": "CVE-2022-36056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
    },
    {
      "name": "CVE-2022-36109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
    },
    {
      "name": "CVE-2023-28755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
    },
    {
      "name": "CVE-2023-30551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
    },
    {
      "name": "CVE-2023-33199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
    },
    {
      "name": "CVE-2023-33202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
    },
    {
      "name": "CVE-2023-46737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-24579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
    },
    {
      "name": "CVE-2024-29902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
    },
    {
      "name": "CVE-2024-29903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
    },
    {
      "name": "CVE-2024-40635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
    },
    {
      "name": "CVE-2024-41909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
    },
    {
      "name": "CVE-2024-45339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2024-52587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
    },
    {
      "name": "CVE-2024-6104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-25186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
    },
    {
      "name": "CVE-2025-27221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
    },
    {
      "name": "CVE-2025-29786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
    },
    {
      "name": "CVE-2025-32441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
    },
    {
      "name": "CVE-2025-32955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-3445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-46727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-47290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-49014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
    },
    {
      "name": "CVE-2025-4949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    }
  ],
  "initial_release_date": "2025-07-25T00:00:00",
  "last_revision_date": "2025-07-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0622",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
    },
    {
      "published_at": "2025-07-24",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
    }
  ]
}
  CERTFR-2025-AVI-0054
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.36 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Connectors (Connector/Python) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Information Schema) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.6.32 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Security: Privileges) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Firewall (Firewall) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Parser) version 8.0.40 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: DDL) version 8.4.3 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) version 8.4.2 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Performance Schema) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Options) version 9.1.0 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.39 et antérieures | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "MySQL Enterprise Backup version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Options) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Options) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Information Schema) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Parser) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.0.36 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DDL) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.4.0",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Parser) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DDL) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Backup version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Information Schema) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Performance Schema) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Backup version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Thread Pooling) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Thread Pooling) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DDL) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (InnoDB) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DDL) version 9.0.1 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Performance Schema) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Connectors (Connector/Python) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Information Schema) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 7.6.32 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Firewall (Firewall) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Components Services) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Cluster version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Security: Privileges) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Firewall (Firewall) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Enterprise Firewall (Firewall) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Parser) version 8.0.40 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: DDL) version 8.4.3 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Packaging) version 8.4.2 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Performance Schema) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Options) version 9.1.0 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Thread Pooling) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    },
    {
      "description": "MySQL Server (Server: Optimizer) version 8.0.39 et ant\u00e9rieures",
      "product": {
        "name": "MySQL",
        "vendor": {
          "name": "Oracle",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-37370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
    },
    {
      "name": "CVE-2025-21500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
    },
    {
      "name": "CVE-2025-21503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
    },
    {
      "name": "CVE-2025-21543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
    },
    {
      "name": "CVE-2025-21494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
    },
    {
      "name": "CVE-2025-21519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
    },
    {
      "name": "CVE-2025-21566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21566"
    },
    {
      "name": "CVE-2025-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
    },
    {
      "name": "CVE-2025-21505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
    },
    {
      "name": "CVE-2025-21501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2025-21521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
    },
    {
      "name": "CVE-2025-21492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
    },
    {
      "name": "CVE-2025-21531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
    },
    {
      "name": "CVE-2025-21555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-21495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21495"
    },
    {
      "name": "CVE-2025-21540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
    },
    {
      "name": "CVE-2025-21548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21548"
    },
    {
      "name": "CVE-2025-21499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
    },
    {
      "name": "CVE-2025-21536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
    },
    {
      "name": "CVE-2025-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
    },
    {
      "name": "CVE-2025-21490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
    },
    {
      "name": "CVE-2025-21520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
    },
    {
      "name": "CVE-2025-21493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
    },
    {
      "name": "CVE-2025-21491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
    },
    {
      "name": "CVE-2025-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
    },
    {
      "name": "CVE-2025-21559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
    },
    {
      "name": "CVE-2025-21504",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-21518",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
    },
    {
      "name": "CVE-2025-21497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
    },
    {
      "name": "CVE-2025-21567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21567"
    },
    {
      "name": "CVE-2025-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
    },
    {
      "name": "CVE-2025-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    }
  ],
  "initial_release_date": "2025-01-22T00:00:00",
  "last_revision_date": "2025-01-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0054",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-01-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
  "vendor_advisories": [
    {
      "published_at": "2025-01-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2025",
      "url": "https://www.oracle.com/security-alerts/cpujan2025.html"
    }
  ]
}
  CERTFR-2025-AVI-0102
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Tenable. Entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Identity Exposure | Identity Exposure versions antérieures à 3.77.8 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Identity Exposure versions ant\u00e9rieures \u00e0 3.77.8",
      "product": {
        "name": "Identity Exposure",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-25629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-1091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1091"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2025-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0760"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    }
  ],
  "initial_release_date": "2025-02-07T00:00:00",
  "last_revision_date": "2025-02-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0102",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-07T00:00:00.000000"
    },
    {
      "description": "Ajout des vuln\u00e9rabilit\u00e9s CVE-2025-0167, CVE-2025-0665 et CVE-2025-0725",
      "revision_date": "2025-02-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Tenable. Entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Tenable",
  "vendor_advisories": [
    {
      "published_at": "2025-02-20",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-01",
      "url": "https://www.tenable.com/security/tns-2025-01"
    }
  ]
}
  CERTFR-2025-AVI-0448
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Nessus Network Monitor. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Nessus Network Monitor | Nessus Network Monitor versions antérieures à 6.5.1 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Nessus Network Monitor versions ant\u00e9rieures \u00e0 6.5.1",
      "product": {
        "name": "Nessus Network Monitor",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-24916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24916"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2025-3241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3241"
    },
    {
      "name": "CVE-2023-7256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7256"
    },
    {
      "name": "CVE-2024-8006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8006"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-24917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24917"
    }
  ],
  "initial_release_date": "2025-05-23T00:00:00",
  "last_revision_date": "2025-05-23T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0448",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Nessus Network Monitor. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Nessus Network Monitor",
  "vendor_advisories": [
    {
      "published_at": "2025-05-23",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-10",
      "url": "https://www.tenable.com/security/tns-2025-10"
    }
  ]
}
  CERTFR-2024-AVI-1063
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans cURL et libcurl. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Curl | cURL et libcurl | cURL et libcurl versions 6.5 à 8.11.x antérieures à 8.11.1 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "cURL et libcurl versions 6.5 \u00e0 8.11.x ant\u00e9rieures \u00e0 8.11.1",
      "product": {
        "name": "cURL et libcurl",
        "vendor": {
          "name": "Curl",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    }
  ],
  "initial_release_date": "2024-12-11T00:00:00",
  "last_revision_date": "2024-12-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1063",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-12-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans cURL et libcurl. Elle permet \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Vuln\u00e9rabilit\u00e9 dans cURL et libcurl",
  "vendor_advisories": [
    {
      "published_at": "2024-12-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Curl CVE-2024-11053",
      "url": "https://curl.se/docs/CVE-2024-11053.html"
    }
  ]
}
  CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | 
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
      "product": {
        "name": "Tanzu Operations Manager",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
      "product": {
        "name": "Tanzu Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
      "product": {
        "name": "Tanzu",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2021-44832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
    },
    {
      "name": "CVE-2021-45105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
    },
    {
      "name": "CVE-2021-44228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
    },
    {
      "name": "CVE-2013-1548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
    },
    {
      "name": "CVE-2015-4779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
    },
    {
      "name": "CVE-2015-4780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
    },
    {
      "name": "CVE-2015-4787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
    },
    {
      "name": "CVE-2015-4790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
    },
    {
      "name": "CVE-2015-4778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
    },
    {
      "name": "CVE-2015-4782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
    },
    {
      "name": "CVE-2015-4789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
    },
    {
      "name": "CVE-2015-4764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
    },
    {
      "name": "CVE-2015-4783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
    },
    {
      "name": "CVE-2015-2583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
    },
    {
      "name": "CVE-2015-4781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
    },
    {
      "name": "CVE-2015-4776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
    },
    {
      "name": "CVE-2015-4786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
    },
    {
      "name": "CVE-2015-2656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
    },
    {
      "name": "CVE-2015-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
    },
    {
      "name": "CVE-2015-4785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
    },
    {
      "name": "CVE-2015-4754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
    },
    {
      "name": "CVE-2015-4775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
    },
    {
      "name": "CVE-2015-4777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
    },
    {
      "name": "CVE-2015-2640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
    },
    {
      "name": "CVE-2015-4774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
    },
    {
      "name": "CVE-2015-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
    },
    {
      "name": "CVE-2015-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
    },
    {
      "name": "CVE-2015-4784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
    },
    {
      "name": "CVE-2015-2654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
    },
    {
      "name": "CVE-2017-8046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
    },
    {
      "name": "CVE-2018-3280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
    },
    {
      "name": "CVE-2018-3137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
    },
    {
      "name": "CVE-2018-3285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
    },
    {
      "name": "CVE-2018-3182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
    },
    {
      "name": "CVE-2018-3186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
    },
    {
      "name": "CVE-2018-3195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
    },
    {
      "name": "CVE-2018-3286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
    },
    {
      "name": "CVE-2018-3170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
    },
    {
      "name": "CVE-2018-3279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
    },
    {
      "name": "CVE-2018-3212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
    },
    {
      "name": "CVE-2018-3203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
    },
    {
      "name": "CVE-2018-3145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
    },
    {
      "name": "CVE-2019-2530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
    },
    {
      "name": "CVE-2019-2436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
    },
    {
      "name": "CVE-2019-2539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
    },
    {
      "name": "CVE-2019-2494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
    },
    {
      "name": "CVE-2019-2535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
    },
    {
      "name": "CVE-2019-2533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
    },
    {
      "name": "CVE-2019-2495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
    },
    {
      "name": "CVE-2019-2513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
    },
    {
      "name": "CVE-2019-2536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
    },
    {
      "name": "CVE-2019-2502",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
    },
    {
      "name": "CVE-2019-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
    },
    {
      "name": "CVE-2019-2587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
    },
    {
      "name": "CVE-2019-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
    },
    {
      "name": "CVE-2019-2691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
    },
    {
      "name": "CVE-2019-2606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
    },
    {
      "name": "CVE-2019-2630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
    },
    {
      "name": "CVE-2019-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
    },
    {
      "name": "CVE-2019-2623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
    },
    {
      "name": "CVE-2019-2695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
    },
    {
      "name": "CVE-2019-2596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
    },
    {
      "name": "CVE-2019-2580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
    },
    {
      "name": "CVE-2019-2644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
    },
    {
      "name": "CVE-2019-2681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
    },
    {
      "name": "CVE-2019-2617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
    },
    {
      "name": "CVE-2019-2636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
    },
    {
      "name": "CVE-2019-2689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
    },
    {
      "name": "CVE-2019-2693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
    },
    {
      "name": "CVE-2019-2593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
    },
    {
      "name": "CVE-2019-2625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
    },
    {
      "name": "CVE-2019-2585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
    },
    {
      "name": "CVE-2019-2631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
    },
    {
      "name": "CVE-2019-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
    },
    {
      "name": "CVE-2019-2620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
    },
    {
      "name": "CVE-2019-2688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
    },
    {
      "name": "CVE-2019-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
    },
    {
      "name": "CVE-2019-2635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
    },
    {
      "name": "CVE-2019-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
    },
    {
      "name": "CVE-2019-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
    },
    {
      "name": "CVE-2019-2685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
    },
    {
      "name": "CVE-2019-2687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
    },
    {
      "name": "CVE-2019-2607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
    },
    {
      "name": "CVE-2019-7317",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
    },
    {
      "name": "CVE-2019-2811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
    },
    {
      "name": "CVE-2019-2740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
    },
    {
      "name": "CVE-2019-2879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
    },
    {
      "name": "CVE-2019-2808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
    },
    {
      "name": "CVE-2019-2738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
    },
    {
      "name": "CVE-2019-2819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
    },
    {
      "name": "CVE-2019-2737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
    },
    {
      "name": "CVE-2019-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
    },
    {
      "name": "CVE-2019-2778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
    },
    {
      "name": "CVE-2019-2822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
    },
    {
      "name": "CVE-2019-2802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
    },
    {
      "name": "CVE-2019-2803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
    },
    {
      "name": "CVE-2019-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
    },
    {
      "name": "CVE-2019-2826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
    },
    {
      "name": "CVE-2019-2784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
    },
    {
      "name": "CVE-2019-2789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
    },
    {
      "name": "CVE-2019-2801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
    },
    {
      "name": "CVE-2019-2791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
    },
    {
      "name": "CVE-2019-2798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
    },
    {
      "name": "CVE-2019-2796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
    },
    {
      "name": "CVE-2019-2815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
    },
    {
      "name": "CVE-2019-2810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
    },
    {
      "name": "CVE-2019-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
    },
    {
      "name": "CVE-2019-2758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
    },
    {
      "name": "CVE-2019-2757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
    },
    {
      "name": "CVE-2019-2785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
    },
    {
      "name": "CVE-2019-2747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
    },
    {
      "name": "CVE-2019-2741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
    },
    {
      "name": "CVE-2019-2830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
    },
    {
      "name": "CVE-2019-2834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
    },
    {
      "name": "CVE-2019-2743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
    },
    {
      "name": "CVE-2019-2739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
    },
    {
      "name": "CVE-2019-2805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
    },
    {
      "name": "CVE-2019-2797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
    },
    {
      "name": "CVE-2019-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
    },
    {
      "name": "CVE-2019-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
    },
    {
      "name": "CVE-2019-2746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
    },
    {
      "name": "CVE-2019-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
    },
    {
      "name": "CVE-2019-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
    },
    {
      "name": "CVE-2019-2914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
    },
    {
      "name": "CVE-2019-2960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
    },
    {
      "name": "CVE-2019-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
    },
    {
      "name": "CVE-2019-2968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
    },
    {
      "name": "CVE-2019-2993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
    },
    {
      "name": "CVE-2019-3009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
    },
    {
      "name": "CVE-2019-2969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
    },
    {
      "name": "CVE-2019-3011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
    },
    {
      "name": "CVE-2019-2967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
    },
    {
      "name": "CVE-2019-2946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
    },
    {
      "name": "CVE-2019-2966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
    },
    {
      "name": "CVE-2019-2957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
    },
    {
      "name": "CVE-2019-2948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
    },
    {
      "name": "CVE-2019-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
    },
    {
      "name": "CVE-2019-3004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
    },
    {
      "name": "CVE-2019-2998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
    },
    {
      "name": "CVE-2019-2911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
    },
    {
      "name": "CVE-2019-2950",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
    },
    {
      "name": "CVE-2019-2910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
    },
    {
      "name": "CVE-2019-3018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
    },
    {
      "name": "CVE-2019-2974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
    },
    {
      "name": "CVE-2019-2991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
    },
    {
      "name": "CVE-2019-2997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
    },
    {
      "name": "CVE-2019-2938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
    },
    {
      "name": "CVE-2019-3003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
    },
    {
      "name": "CVE-2019-2982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
    },
    {
      "name": "CVE-2019-2963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
    },
    {
      "name": "CVE-2020-2579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
    },
    {
      "name": "CVE-2020-2584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
    },
    {
      "name": "CVE-2020-2577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
    },
    {
      "name": "CVE-2020-2679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
    },
    {
      "name": "CVE-2020-2570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
    },
    {
      "name": "CVE-2020-2572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
    },
    {
      "name": "CVE-2020-2627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
    },
    {
      "name": "CVE-2020-2660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
    },
    {
      "name": "CVE-2020-2589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
    },
    {
      "name": "CVE-2020-2573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
    },
    {
      "name": "CVE-2020-2686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
    },
    {
      "name": "CVE-2020-2694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
    },
    {
      "name": "CVE-2020-2574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
    },
    {
      "name": "CVE-2020-2770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
    },
    {
      "name": "CVE-2020-2925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
    },
    {
      "name": "CVE-2020-2853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
    },
    {
      "name": "CVE-2020-2774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
    },
    {
      "name": "CVE-2020-2928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
    },
    {
      "name": "CVE-2020-2897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
    },
    {
      "name": "CVE-2020-2812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
    },
    {
      "name": "CVE-2020-2765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
    },
    {
      "name": "CVE-2020-2761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
    },
    {
      "name": "CVE-2020-2790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
    },
    {
      "name": "CVE-2020-2752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
    },
    {
      "name": "CVE-2020-2904",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
    },
    {
      "name": "CVE-2020-2893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
    },
    {
      "name": "CVE-2020-2760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
    },
    {
      "name": "CVE-2020-2780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
    },
    {
      "name": "CVE-2020-2903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
    },
    {
      "name": "CVE-2020-2924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
    },
    {
      "name": "CVE-2020-2806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
    },
    {
      "name": "CVE-2020-2922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
    },
    {
      "name": "CVE-2020-2901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
    },
    {
      "name": "CVE-2020-2926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
    },
    {
      "name": "CVE-2020-2923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
    },
    {
      "name": "CVE-2020-2921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
    },
    {
      "name": "CVE-2020-2779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
    },
    {
      "name": "CVE-2020-2892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
    },
    {
      "name": "CVE-2020-2896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
    },
    {
      "name": "CVE-2020-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
    },
    {
      "name": "CVE-2020-2895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
    },
    {
      "name": "CVE-2020-2930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
    },
    {
      "name": "CVE-2020-2814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
    },
    {
      "name": "CVE-2020-2759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
    },
    {
      "name": "CVE-2020-2763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
    },
    {
      "name": "CVE-2020-14550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
    },
    {
      "name": "CVE-2020-14567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
    },
    {
      "name": "CVE-2020-14559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
    },
    {
      "name": "CVE-2020-14576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
    },
    {
      "name": "CVE-2020-14540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
    },
    {
      "name": "CVE-2020-14547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
    },
    {
      "name": "CVE-2020-14553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
    },
    {
      "name": "CVE-2020-14539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
    },
    {
      "name": "CVE-2020-14845",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
    },
    {
      "name": "CVE-2020-14799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
    },
    {
      "name": "CVE-2020-14793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
    },
    {
      "name": "CVE-2020-14888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
    },
    {
      "name": "CVE-2020-14790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
    },
    {
      "name": "CVE-2020-14789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
    },
    {
      "name": "CVE-2020-14672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
    },
    {
      "name": "CVE-2020-14846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
    },
    {
      "name": "CVE-2020-14771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
    },
    {
      "name": "CVE-2020-14873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
    },
    {
      "name": "CVE-2020-14791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
    },
    {
      "name": "CVE-2020-14769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
    },
    {
      "name": "CVE-2020-14844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
    },
    {
      "name": "CVE-2020-14809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
    },
    {
      "name": "CVE-2020-14860",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
    },
    {
      "name": "CVE-2020-14866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
    },
    {
      "name": "CVE-2020-14861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
    },
    {
      "name": "CVE-2020-14773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
    },
    {
      "name": "CVE-2020-14776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
    },
    {
      "name": "CVE-2020-14852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
    },
    {
      "name": "CVE-2020-14760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
    },
    {
      "name": "CVE-2020-14870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
    },
    {
      "name": "CVE-2020-14837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
    },
    {
      "name": "CVE-2020-14893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
    },
    {
      "name": "CVE-2020-14836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
    },
    {
      "name": "CVE-2020-14829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
    },
    {
      "name": "CVE-2020-14868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
    },
    {
      "name": "CVE-2020-14827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
    },
    {
      "name": "CVE-2020-14839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
    },
    {
      "name": "CVE-2020-14777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
    },
    {
      "name": "CVE-2020-14812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
    },
    {
      "name": "CVE-2020-14775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
    },
    {
      "name": "CVE-2020-14838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
    },
    {
      "name": "CVE-2020-14869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
    },
    {
      "name": "CVE-2020-14765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
    },
    {
      "name": "CVE-2020-14814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
    },
    {
      "name": "CVE-2020-14821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
    },
    {
      "name": "CVE-2020-14830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
    },
    {
      "name": "CVE-2020-14828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
    },
    {
      "name": "CVE-2020-14804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
    },
    {
      "name": "CVE-2020-14800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
    },
    {
      "name": "CVE-2020-14891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
    },
    {
      "name": "CVE-2020-14848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
    },
    {
      "name": "CVE-2020-14867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
    },
    {
      "name": "CVE-2020-14785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
    },
    {
      "name": "CVE-2020-14794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
    },
    {
      "name": "CVE-2020-14786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
    },
    {
      "name": "CVE-2020-15358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
    },
    {
      "name": "CVE-2020-1971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
    },
    {
      "name": "CVE-2021-2010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
    },
    {
      "name": "CVE-2021-2001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
    },
    {
      "name": "CVE-2021-2060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
    },
    {
      "name": "CVE-2021-2014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
    },
    {
      "name": "CVE-2021-2032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
    },
    {
      "name": "CVE-2021-2036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
    },
    {
      "name": "CVE-2021-2007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
    },
    {
      "name": "CVE-2021-2011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
    },
    {
      "name": "CVE-2021-2022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2021-2308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
    },
    {
      "name": "CVE-2021-2213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
    },
    {
      "name": "CVE-2021-2172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
    },
    {
      "name": "CVE-2021-2293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
    },
    {
      "name": "CVE-2021-2208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
    },
    {
      "name": "CVE-2021-2196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
    },
    {
      "name": "CVE-2021-2194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
    },
    {
      "name": "CVE-2021-2298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
    },
    {
      "name": "CVE-2021-2162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
    },
    {
      "name": "CVE-2021-2179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
    },
    {
      "name": "CVE-2021-2307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
    },
    {
      "name": "CVE-2021-2217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
    },
    {
      "name": "CVE-2021-2180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
    },
    {
      "name": "CVE-2021-2203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
    },
    {
      "name": "CVE-2021-2144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
    },
    {
      "name": "CVE-2021-2226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
    },
    {
      "name": "CVE-2021-2232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
    },
    {
      "name": "CVE-2021-2169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
    },
    {
      "name": "CVE-2021-2301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
    },
    {
      "name": "CVE-2021-2202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
    },
    {
      "name": "CVE-2021-2166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
    },
    {
      "name": "CVE-2021-2174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
    },
    {
      "name": "CVE-2021-2154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
    },
    {
      "name": "CVE-2021-2193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
    },
    {
      "name": "CVE-2021-2300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
    },
    {
      "name": "CVE-2021-2299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
    },
    {
      "name": "CVE-2021-2212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
    },
    {
      "name": "CVE-2021-2178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
    },
    {
      "name": "CVE-2021-2146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
    },
    {
      "name": "CVE-2021-2230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
    },
    {
      "name": "CVE-2021-2278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
    },
    {
      "name": "CVE-2021-2164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
    },
    {
      "name": "CVE-2021-2201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
    },
    {
      "name": "CVE-2021-2170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
    },
    {
      "name": "CVE-2021-2304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
    },
    {
      "name": "CVE-2021-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
    },
    {
      "name": "CVE-2021-2171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
    },
    {
      "name": "CVE-2021-2305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
    },
    {
      "name": "CVE-2021-2215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
    },
    {
      "name": "CVE-2021-25214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
    },
    {
      "name": "CVE-2012-6153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-2370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
    },
    {
      "name": "CVE-2021-2389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
    },
    {
      "name": "CVE-2021-2444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
    },
    {
      "name": "CVE-2021-2429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
    },
    {
      "name": "CVE-2021-2426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
    },
    {
      "name": "CVE-2021-2427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
    },
    {
      "name": "CVE-2021-2339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
    },
    {
      "name": "CVE-2021-2425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
    },
    {
      "name": "CVE-2021-2387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
    },
    {
      "name": "CVE-2021-2383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
    },
    {
      "name": "CVE-2021-2372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
    },
    {
      "name": "CVE-2021-2399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
    },
    {
      "name": "CVE-2021-2384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
    },
    {
      "name": "CVE-2021-2412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
    },
    {
      "name": "CVE-2021-2441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
    },
    {
      "name": "CVE-2021-2410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
    },
    {
      "name": "CVE-2021-2342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
    },
    {
      "name": "CVE-2021-2437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
    },
    {
      "name": "CVE-2021-2417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
    },
    {
      "name": "CVE-2021-2424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
    },
    {
      "name": "CVE-2021-2385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
    },
    {
      "name": "CVE-2021-2357",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
    },
    {
      "name": "CVE-2021-2352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
    },
    {
      "name": "CVE-2021-2402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
    },
    {
      "name": "CVE-2021-2440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
    },
    {
      "name": "CVE-2021-2340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
    },
    {
      "name": "CVE-2021-2390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
    },
    {
      "name": "CVE-2021-2374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
    },
    {
      "name": "CVE-2021-2356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
    },
    {
      "name": "CVE-2021-2411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
    },
    {
      "name": "CVE-2021-2418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
    },
    {
      "name": "CVE-2021-2367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
    },
    {
      "name": "CVE-2021-2354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
    },
    {
      "name": "CVE-2021-2422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2021-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
    },
    {
      "name": "CVE-2020-28500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
    },
    {
      "name": "CVE-2019-18276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-35640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
    },
    {
      "name": "CVE-2021-35626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
    },
    {
      "name": "CVE-2021-2478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
    },
    {
      "name": "CVE-2021-35624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
    },
    {
      "name": "CVE-2021-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
    },
    {
      "name": "CVE-2021-35628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
    },
    {
      "name": "CVE-2021-35630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
    },
    {
      "name": "CVE-2021-35644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
    },
    {
      "name": "CVE-2021-2479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
    },
    {
      "name": "CVE-2021-35638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
    },
    {
      "name": "CVE-2021-35646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
    },
    {
      "name": "CVE-2021-35596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
    },
    {
      "name": "CVE-2021-35643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
    },
    {
      "name": "CVE-2021-35637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
    },
    {
      "name": "CVE-2021-35623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
    },
    {
      "name": "CVE-2021-35632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
    },
    {
      "name": "CVE-2021-35641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
    },
    {
      "name": "CVE-2021-35604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
    },
    {
      "name": "CVE-2021-35636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
    },
    {
      "name": "CVE-2021-35546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
    },
    {
      "name": "CVE-2021-35627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
    },
    {
      "name": "CVE-2021-35625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
    },
    {
      "name": "CVE-2021-35608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
    },
    {
      "name": "CVE-2021-35597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
    },
    {
      "name": "CVE-2021-35537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
    },
    {
      "name": "CVE-2021-2481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
    },
    {
      "name": "CVE-2021-35622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
    },
    {
      "name": "CVE-2021-35610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
    },
    {
      "name": "CVE-2021-35633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
    },
    {
      "name": "CVE-2021-35634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
    },
    {
      "name": "CVE-2021-35629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
    },
    {
      "name": "CVE-2021-35631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
    },
    {
      "name": "CVE-2021-35645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
    },
    {
      "name": "CVE-2021-35647",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
    },
    {
      "name": "CVE-2021-35612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
    },
    {
      "name": "CVE-2021-35639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
    },
    {
      "name": "CVE-2021-35648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
    },
    {
      "name": "CVE-2021-35607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
    },
    {
      "name": "CVE-2021-35602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
    },
    {
      "name": "CVE-2021-35577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
    },
    {
      "name": "CVE-2021-35642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
    },
    {
      "name": "CVE-2021-35575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
    },
    {
      "name": "CVE-2021-35635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
    },
    {
      "name": "CVE-2021-35591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
    },
    {
      "name": "CVE-2021-25219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
    },
    {
      "name": "CVE-2021-3875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
    },
    {
      "name": "CVE-2019-10744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
    },
    {
      "name": "CVE-2022-21352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
    },
    {
      "name": "CVE-2022-21304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
    },
    {
      "name": "CVE-2022-21254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
    },
    {
      "name": "CVE-2022-21265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
    },
    {
      "name": "CVE-2022-21348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
    },
    {
      "name": "CVE-2022-21372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
    },
    {
      "name": "CVE-2022-21245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
    },
    {
      "name": "CVE-2022-21368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
    },
    {
      "name": "CVE-2022-21339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
    },
    {
      "name": "CVE-2022-21264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
    },
    {
      "name": "CVE-2022-21297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
    },
    {
      "name": "CVE-2022-21379",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
    },
    {
      "name": "CVE-2022-21253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
    },
    {
      "name": "CVE-2022-21301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
    },
    {
      "name": "CVE-2022-21378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
    },
    {
      "name": "CVE-2022-21370",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
    },
    {
      "name": "CVE-2022-21302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
    },
    {
      "name": "CVE-2022-21249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
    },
    {
      "name": "CVE-2022-21344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
    },
    {
      "name": "CVE-2022-21270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
    },
    {
      "name": "CVE-2022-21367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
    },
    {
      "name": "CVE-2022-21342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
    },
    {
      "name": "CVE-2022-21362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
    },
    {
      "name": "CVE-2022-21303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
    },
    {
      "name": "CVE-2022-21256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
    },
    {
      "name": "CVE-2022-21358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
    },
    {
      "name": "CVE-2022-21374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
    },
    {
      "name": "CVE-2022-3602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-35737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2020-8203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
    },
    {
      "name": "CVE-2022-3786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
    },
    {
      "name": "CVE-2022-2795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2022-3996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
    },
    {
      "name": "CVE-2022-22942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
    },
    {
      "name": "CVE-2021-4193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
    },
    {
      "name": "CVE-2020-15366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
    },
    {
      "name": "CVE-2022-22965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
    },
    {
      "name": "CVE-2022-0213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
    },
    {
      "name": "CVE-2022-21418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
    },
    {
      "name": "CVE-2022-21412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
    },
    {
      "name": "CVE-2022-21437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
    },
    {
      "name": "CVE-2022-21478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
    },
    {
      "name": "CVE-2022-21479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
    },
    {
      "name": "CVE-2022-21438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
    },
    {
      "name": "CVE-2022-21440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
    },
    {
      "name": "CVE-2022-21451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
    },
    {
      "name": "CVE-2022-21427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
    },
    {
      "name": "CVE-2022-21415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
    },
    {
      "name": "CVE-2022-21459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
    },
    {
      "name": "CVE-2022-21460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
    },
    {
      "name": "CVE-2022-21414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
    },
    {
      "name": "CVE-2022-21413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
    },
    {
      "name": "CVE-2022-21436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
    },
    {
      "name": "CVE-2022-21435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
    },
    {
      "name": "CVE-2022-21462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
    },
    {
      "name": "CVE-2022-21444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
    },
    {
      "name": "CVE-2022-21417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
    },
    {
      "name": "CVE-2022-21457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
    },
    {
      "name": "CVE-2022-21425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
    },
    {
      "name": "CVE-2022-21452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
    },
    {
      "name": "CVE-2021-20266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
    },
    {
      "name": "CVE-2022-1292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
    },
    {
      "name": "CVE-2022-1473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
    },
    {
      "name": "CVE-2021-3521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
    },
    {
      "name": "CVE-2021-4122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
    },
    {
      "name": "CVE-2022-2068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2022-21525",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
    },
    {
      "name": "CVE-2022-21537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
    },
    {
      "name": "CVE-2022-21455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
    },
    {
      "name": "CVE-2022-21534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
    },
    {
      "name": "CVE-2022-21528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
    },
    {
      "name": "CVE-2022-21529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
    },
    {
      "name": "CVE-2022-21531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
    },
    {
      "name": "CVE-2022-21515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
    },
    {
      "name": "CVE-2022-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
    },
    {
      "name": "CVE-2022-21527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
    },
    {
      "name": "CVE-2022-21517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
    },
    {
      "name": "CVE-2022-21539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
    },
    {
      "name": "CVE-2022-21556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
    },
    {
      "name": "CVE-2022-21509",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
    },
    {
      "name": "CVE-2022-21553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
    },
    {
      "name": "CVE-2022-21530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
    },
    {
      "name": "CVE-2022-21522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
    },
    {
      "name": "CVE-2022-21547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
    },
    {
      "name": "CVE-2022-21569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
    },
    {
      "name": "CVE-2022-21526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2021-25220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
    },
    {
      "name": "CVE-2022-0396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
    },
    {
      "name": "CVE-2022-3358",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2012-5783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
    },
    {
      "name": "CVE-2022-21592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
    },
    {
      "name": "CVE-2022-21617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
    },
    {
      "name": "CVE-2022-21595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
    },
    {
      "name": "CVE-2022-21608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
    },
    {
      "name": "CVE-2022-21589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
    },
    {
      "name": "CVE-2023-21863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
    },
    {
      "name": "CVE-2023-21873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
    },
    {
      "name": "CVE-2023-21879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
    },
    {
      "name": "CVE-2023-21880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
    },
    {
      "name": "CVE-2023-21869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
    },
    {
      "name": "CVE-2023-21872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
    },
    {
      "name": "CVE-2023-21877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
    },
    {
      "name": "CVE-2023-21870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
    },
    {
      "name": "CVE-2023-21887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
    },
    {
      "name": "CVE-2023-21836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
    },
    {
      "name": "CVE-2023-21881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
    },
    {
      "name": "CVE-2023-21876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
    },
    {
      "name": "CVE-2023-21840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
    },
    {
      "name": "CVE-2023-21878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
    },
    {
      "name": "CVE-2023-21866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
    },
    {
      "name": "CVE-2023-21875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
    },
    {
      "name": "CVE-2023-21865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
    },
    {
      "name": "CVE-2023-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
    },
    {
      "name": "CVE-2023-21867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
    },
    {
      "name": "CVE-2023-21874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
    },
    {
      "name": "CVE-2023-21871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
    },
    {
      "name": "CVE-2023-0286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
    },
    {
      "name": "CVE-2023-0401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
    },
    {
      "name": "CVE-2023-0215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
    },
    {
      "name": "CVE-2023-0217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
    },
    {
      "name": "CVE-2023-0216",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
    },
    {
      "name": "CVE-2022-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
    },
    {
      "name": "CVE-2022-4415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
    },
    {
      "name": "CVE-2023-24329",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
    },
    {
      "name": "CVE-2023-0464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
    },
    {
      "name": "CVE-2023-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
    },
    {
      "name": "CVE-2023-21977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
    },
    {
      "name": "CVE-2023-21912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2023-20873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
    },
    {
      "name": "CVE-2023-20883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2023-27537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2022-46908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-22053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
    },
    {
      "name": "CVE-2023-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
    },
    {
      "name": "CVE-2022-4899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
    },
    {
      "name": "CVE-2022-25883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-44487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
    },
    {
      "name": "CVE-2016-1000027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
    },
    {
      "name": "CVE-2023-35116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
    },
    {
      "name": "CVE-2023-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
    },
    {
      "name": "CVE-2023-22084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
    },
    {
      "name": "CVE-2023-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
    },
    {
      "name": "CVE-2023-22028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
    },
    {
      "name": "CVE-2023-22015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
    },
    {
      "name": "CVE-2023-22103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
    },
    {
      "name": "CVE-2023-22068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
    },
    {
      "name": "CVE-2023-22078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-22059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
    },
    {
      "name": "CVE-2023-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
    },
    {
      "name": "CVE-2023-22114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
    },
    {
      "name": "CVE-2023-22070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
    },
    {
      "name": "CVE-2023-22032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2023-4807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-5678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
    },
    {
      "name": "CVE-2023-40217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2021-22570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2023-2602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2023-34055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
    },
    {
      "name": "CVE-2023-4039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
    },
    {
      "name": "CVE-2022-3715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2022-48522",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-33294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2023-4016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2023-34969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
    },
    {
      "name": "CVE-2021-20193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-5981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
    },
    {
      "name": "CVE-2023-48795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
    },
    {
      "name": "CVE-2023-6237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-36054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
    },
    {
      "name": "CVE-2023-7104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
    },
    {
      "name": "CVE-2023-6129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-46219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
    },
    {
      "name": "CVE-2024-0727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
    },
    {
      "name": "CVE-2023-47100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2023-39325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
    },
    {
      "name": "CVE-2022-27772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
    },
    {
      "name": "CVE-2023-27043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
    },
    {
      "name": "CVE-2023-6481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-2511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2016-2781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
    },
    {
      "name": "CVE-2023-3978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2024-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-6597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
    },
    {
      "name": "CVE-2024-26686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
    },
    {
      "name": "CVE-2023-52572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
    },
    {
      "name": "CVE-2007-4559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
    },
    {
      "name": "CVE-2023-3138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
    },
    {
      "name": "CVE-2024-28182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
    },
    {
      "name": "CVE-2023-45288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-6378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
    },
    {
      "name": "CVE-2023-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
    },
    {
      "name": "CVE-2024-26739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2023-51074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
    },
    {
      "name": "CVE-2023-52757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
    },
    {
      "name": "CVE-2024-35866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
    },
    {
      "name": "CVE-2024-35867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
    },
    {
      "name": "CVE-2024-35943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
    },
    {
      "name": "CVE-2024-28180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2024-30171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
    },
    {
      "name": "CVE-2024-30172",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-35790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2024-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-0397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
    },
    {
      "name": "CVE-2024-4030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-3596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
    },
    {
      "name": "CVE-2024-0450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-26458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
    },
    {
      "name": "CVE-2024-26461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2024-35195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
    },
    {
      "name": "CVE-2024-36945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
    },
    {
      "name": "CVE-2024-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
    },
    {
      "name": "CVE-2024-38541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2024-0567",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2024-21137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
    },
    {
      "name": "CVE-2024-0760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
    },
    {
      "name": "CVE-2024-1737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
    },
    {
      "name": "CVE-2024-1975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
    },
    {
      "name": "CVE-2024-28835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
    },
    {
      "name": "CVE-2024-6923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2024-36908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
    },
    {
      "name": "CVE-2024-27402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2024-38808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
    },
    {
      "name": "CVE-2024-38809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
    },
    {
      "name": "CVE-2024-42230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
    },
    {
      "name": "CVE-2024-38807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2022-48893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
    },
    {
      "name": "CVE-2024-42322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2023-5841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
    },
    {
      "name": "CVE-2024-34459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2023-6246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
    },
    {
      "name": "CVE-2024-46812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
    },
    {
      "name": "CVE-2024-46821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
    },
    {
      "name": "CVE-2024-46751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
    },
    {
      "name": "CVE-2024-46753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
    },
    {
      "name": "CVE-2024-46774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
    },
    {
      "name": "CVE-2024-46787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
    },
    {
      "name": "CVE-2022-21454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
    },
    {
      "name": "CVE-2024-21193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
    },
    {
      "name": "CVE-2024-21194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
    },
    {
      "name": "CVE-2024-21196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
    },
    {
      "name": "CVE-2024-21197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
    },
    {
      "name": "CVE-2024-21198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
    },
    {
      "name": "CVE-2024-21199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
    },
    {
      "name": "CVE-2024-21201",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
    },
    {
      "name": "CVE-2024-21207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
    },
    {
      "name": "CVE-2024-21209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
    },
    {
      "name": "CVE-2024-21212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
    },
    {
      "name": "CVE-2024-21213",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
    },
    {
      "name": "CVE-2024-21219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
    },
    {
      "name": "CVE-2024-21236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
    },
    {
      "name": "CVE-2024-21239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
    },
    {
      "name": "CVE-2024-21241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
    },
    {
      "name": "CVE-2024-7254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2024-38820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
    },
    {
      "name": "CVE-2024-10487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
    },
    {
      "name": "CVE-2024-10458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
    },
    {
      "name": "CVE-2024-10459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
    },
    {
      "name": "CVE-2024-10460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
    },
    {
      "name": "CVE-2024-10461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
    },
    {
      "name": "CVE-2024-10462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
    },
    {
      "name": "CVE-2024-10463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
    },
    {
      "name": "CVE-2024-10464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
    },
    {
      "name": "CVE-2024-10465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
    },
    {
      "name": "CVE-2024-10466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
    },
    {
      "name": "CVE-2024-10467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
    },
    {
      "name": "CVE-2024-10468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
    },
    {
      "name": "CVE-2024-34447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
    },
    {
      "name": "CVE-2024-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
    },
    {
      "name": "CVE-2024-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2024-46816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
    },
    {
      "name": "CVE-2024-11395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
    },
    {
      "name": "CVE-2024-49960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
    },
    {
      "name": "CVE-2024-50047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
    },
    {
      "name": "CVE-2024-50073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
    },
    {
      "name": "CVE-2024-11691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
    },
    {
      "name": "CVE-2024-11692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
    },
    {
      "name": "CVE-2024-11693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
    },
    {
      "name": "CVE-2024-11694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
    },
    {
      "name": "CVE-2024-11695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
    },
    {
      "name": "CVE-2024-11696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
    },
    {
      "name": "CVE-2024-11697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
    },
    {
      "name": "CVE-2024-11698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
    },
    {
      "name": "CVE-2024-11699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
    },
    {
      "name": "CVE-2024-11700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
    },
    {
      "name": "CVE-2024-11701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
    },
    {
      "name": "CVE-2024-11702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
    },
    {
      "name": "CVE-2024-11703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
    },
    {
      "name": "CVE-2024-11704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
    },
    {
      "name": "CVE-2024-11705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
    },
    {
      "name": "CVE-2024-11706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
    },
    {
      "name": "CVE-2024-11708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
    },
    {
      "name": "CVE-2024-50272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
    },
    {
      "name": "CVE-2024-50280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-10963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
    },
    {
      "name": "CVE-2024-47554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
    },
    {
      "name": "CVE-2024-49989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
    },
    {
      "name": "CVE-2024-50125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
    },
    {
      "name": "CVE-2024-53051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
    },
    {
      "name": "CVE-2024-53144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
    },
    {
      "name": "CVE-2024-8805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
    },
    {
      "name": "CVE-2025-0237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
    },
    {
      "name": "CVE-2025-0238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
    },
    {
      "name": "CVE-2025-0239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
    },
    {
      "name": "CVE-2025-0240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
    },
    {
      "name": "CVE-2025-0241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
    },
    {
      "name": "CVE-2025-0242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
    },
    {
      "name": "CVE-2025-0243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
    },
    {
      "name": "CVE-2025-0245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
    },
    {
      "name": "CVE-2025-0247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
    },
    {
      "name": "CVE-2025-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
    },
    {
      "name": "CVE-2025-0435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
    },
    {
      "name": "CVE-2025-0436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
    },
    {
      "name": "CVE-2025-0437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
    },
    {
      "name": "CVE-2025-0438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
    },
    {
      "name": "CVE-2025-0439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
    },
    {
      "name": "CVE-2025-0440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
    },
    {
      "name": "CVE-2025-0441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
    },
    {
      "name": "CVE-2025-0442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
    },
    {
      "name": "CVE-2025-0443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
    },
    {
      "name": "CVE-2025-0446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
    },
    {
      "name": "CVE-2025-0447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
    },
    {
      "name": "CVE-2025-0448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
    },
    {
      "name": "CVE-2025-21523",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
    },
    {
      "name": "CVE-2025-0612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
    },
    {
      "name": "CVE-2025-23083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
    },
    {
      "name": "CVE-2025-23084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
    },
    {
      "name": "CVE-2025-23085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
    },
    {
      "name": "CVE-2025-0445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
    },
    {
      "name": "CVE-2025-0451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
    },
    {
      "name": "CVE-2025-0762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
    },
    {
      "name": "CVE-2025-1009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
    },
    {
      "name": "CVE-2025-1010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
    },
    {
      "name": "CVE-2025-1011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
    },
    {
      "name": "CVE-2025-1012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
    },
    {
      "name": "CVE-2025-1013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
    },
    {
      "name": "CVE-2025-1014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
    },
    {
      "name": "CVE-2024-56664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
    },
    {
      "name": "CVE-2025-1016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
    },
    {
      "name": "CVE-2025-1017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
    },
    {
      "name": "CVE-2025-1018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
    },
    {
      "name": "CVE-2025-1019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
    },
    {
      "name": "CVE-2025-1020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-47535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
    },
    {
      "name": "CVE-2024-50258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
    },
    {
      "name": "CVE-2024-53203",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
    },
    {
      "name": "CVE-2024-53128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
    },
    {
      "name": "CVE-2025-0995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
    },
    {
      "name": "CVE-2025-0996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
    },
    {
      "name": "CVE-2025-0997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
    },
    {
      "name": "CVE-2025-0998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
    },
    {
      "name": "CVE-2025-0999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
    },
    {
      "name": "CVE-2025-1006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
    },
    {
      "name": "CVE-2025-1426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
    },
    {
      "name": "CVE-2024-56751",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
    },
    {
      "name": "CVE-2023-39017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2025-1914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
    },
    {
      "name": "CVE-2025-1915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
    },
    {
      "name": "CVE-2025-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
    },
    {
      "name": "CVE-2025-1917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
    },
    {
      "name": "CVE-2025-1918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
    },
    {
      "name": "CVE-2025-1919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
    },
    {
      "name": "CVE-2025-1921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
    },
    {
      "name": "CVE-2025-1922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
    },
    {
      "name": "CVE-2025-1923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
    },
    {
      "name": "CVE-2025-1930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
    },
    {
      "name": "CVE-2025-1931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
    },
    {
      "name": "CVE-2025-1932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
    },
    {
      "name": "CVE-2025-1933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
    },
    {
      "name": "CVE-2025-1934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
    },
    {
      "name": "CVE-2025-1935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
    },
    {
      "name": "CVE-2025-1936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
    },
    {
      "name": "CVE-2025-1937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
    },
    {
      "name": "CVE-2025-1938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
    },
    {
      "name": "CVE-2025-1939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
    },
    {
      "name": "CVE-2025-1940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
    },
    {
      "name": "CVE-2025-1941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
    },
    {
      "name": "CVE-2025-1942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
    },
    {
      "name": "CVE-2025-1943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
    },
    {
      "name": "CVE-2025-1920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
    },
    {
      "name": "CVE-2025-2135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
    },
    {
      "name": "CVE-2025-2136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
    },
    {
      "name": "CVE-2025-2137",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
    },
    {
      "name": "CVE-2025-24813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
    },
    {
      "name": "CVE-2024-45772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
    },
    {
      "name": "CVE-2025-2476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
    },
    {
      "name": "CVE-2025-2857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2025-2783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2022-49535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2025-3066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
    },
    {
      "name": "CVE-2025-3067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
    },
    {
      "name": "CVE-2025-3068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
    },
    {
      "name": "CVE-2025-3071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
    },
    {
      "name": "CVE-2025-3072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
    },
    {
      "name": "CVE-2025-3073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
    },
    {
      "name": "CVE-2025-3074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
    },
    {
      "name": "CVE-2025-3028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
    },
    {
      "name": "CVE-2025-3029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
    },
    {
      "name": "CVE-2025-3030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
    },
    {
      "name": "CVE-2025-3031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
    },
    {
      "name": "CVE-2025-3032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
    },
    {
      "name": "CVE-2025-3033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
    },
    {
      "name": "CVE-2025-3034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
    },
    {
      "name": "CVE-2025-3035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
    },
    {
      "name": "CVE-2024-54458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
    },
    {
      "name": "CVE-2025-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
    },
    {
      "name": "CVE-2025-21574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
    },
    {
      "name": "CVE-2025-21575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
    },
    {
      "name": "CVE-2025-21577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
    },
    {
      "name": "CVE-2025-21579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
    },
    {
      "name": "CVE-2025-21580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
    },
    {
      "name": "CVE-2025-21581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
    },
    {
      "name": "CVE-2025-21584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
    },
    {
      "name": "CVE-2025-21585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
    },
    {
      "name": "CVE-2025-21588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
    },
    {
      "name": "CVE-2025-30681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
    },
    {
      "name": "CVE-2025-30682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
    },
    {
      "name": "CVE-2025-30683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
    },
    {
      "name": "CVE-2025-30684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
    },
    {
      "name": "CVE-2025-30685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
    },
    {
      "name": "CVE-2025-30687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
    },
    {
      "name": "CVE-2025-30688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
    },
    {
      "name": "CVE-2025-30689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
    },
    {
      "name": "CVE-2025-30693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
    },
    {
      "name": "CVE-2025-30695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
    },
    {
      "name": "CVE-2025-30696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
    },
    {
      "name": "CVE-2025-30699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
    },
    {
      "name": "CVE-2025-30703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
    },
    {
      "name": "CVE-2025-30704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
    },
    {
      "name": "CVE-2025-30705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
    },
    {
      "name": "CVE-2025-30715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
    },
    {
      "name": "CVE-2025-30721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
    },
    {
      "name": "CVE-2025-21839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
    },
    {
      "name": "CVE-2025-3619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
    },
    {
      "name": "CVE-2025-3620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
    },
    {
      "name": "CVE-2025-21956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
    },
    {
      "name": "CVE-2025-21957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
    },
    {
      "name": "CVE-2025-21959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
    },
    {
      "name": "CVE-2025-21962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
    },
    {
      "name": "CVE-2025-21963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
    },
    {
      "name": "CVE-2025-21964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
    },
    {
      "name": "CVE-2025-21968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
    },
    {
      "name": "CVE-2025-21970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
    },
    {
      "name": "CVE-2025-21975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
    },
    {
      "name": "CVE-2025-21981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
    },
    {
      "name": "CVE-2025-21991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
    },
    {
      "name": "CVE-2025-21992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
    },
    {
      "name": "CVE-2025-21994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
    },
    {
      "name": "CVE-2025-21996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
    },
    {
      "name": "CVE-2025-21999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
    },
    {
      "name": "CVE-2025-22004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
    },
    {
      "name": "CVE-2025-22005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
    },
    {
      "name": "CVE-2025-22007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
    },
    {
      "name": "CVE-2025-22008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
    },
    {
      "name": "CVE-2025-22010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
    },
    {
      "name": "CVE-2025-22014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
    },
    {
      "name": "CVE-2024-12798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
    },
    {
      "name": "CVE-2024-12801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
    },
    {
      "name": "CVE-2025-2312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-4050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
    },
    {
      "name": "CVE-2025-4051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
    },
    {
      "name": "CVE-2025-4052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
    },
    {
      "name": "CVE-2025-4096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
    },
    {
      "name": "CVE-2025-2817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
    },
    {
      "name": "CVE-2025-4082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
    },
    {
      "name": "CVE-2025-4083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
    },
    {
      "name": "CVE-2025-4085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
    },
    {
      "name": "CVE-2025-4087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
    },
    {
      "name": "CVE-2025-4088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
    },
    {
      "name": "CVE-2025-4089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
    },
    {
      "name": "CVE-2025-4090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
    },
    {
      "name": "CVE-2025-4091",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
    },
    {
      "name": "CVE-2025-4092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
    },
    {
      "name": "CVE-2023-53034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
    },
    {
      "name": "CVE-2024-46742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
    },
    {
      "name": "CVE-2025-21853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
    },
    {
      "name": "CVE-2025-22025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
    },
    {
      "name": "CVE-2025-22027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
    },
    {
      "name": "CVE-2025-22035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
    },
    {
      "name": "CVE-2025-22044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
    },
    {
      "name": "CVE-2025-22045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
    },
    {
      "name": "CVE-2025-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
    },
    {
      "name": "CVE-2025-22054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
    },
    {
      "name": "CVE-2025-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
    },
    {
      "name": "CVE-2025-22056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
    },
    {
      "name": "CVE-2025-22060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
    },
    {
      "name": "CVE-2025-22063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
    },
    {
      "name": "CVE-2025-22066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
    },
    {
      "name": "CVE-2025-22071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
    },
    {
      "name": "CVE-2025-22073",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
    },
    {
      "name": "CVE-2025-22075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
    },
    {
      "name": "CVE-2025-22079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
    },
    {
      "name": "CVE-2025-22081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
    },
    {
      "name": "CVE-2025-22086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
    },
    {
      "name": "CVE-2025-22089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
    },
    {
      "name": "CVE-2025-22097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
    },
    {
      "name": "CVE-2025-23136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
    },
    {
      "name": "CVE-2025-23138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
    },
    {
      "name": "CVE-2025-37785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
    },
    {
      "name": "CVE-2025-37838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
    },
    {
      "name": "CVE-2025-38152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
    },
    {
      "name": "CVE-2025-38575",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
    },
    {
      "name": "CVE-2025-38637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
    },
    {
      "name": "CVE-2025-39728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
    },
    {
      "name": "CVE-2025-39735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
    },
    {
      "name": "CVE-2025-27516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
    },
    {
      "name": "CVE-2025-29087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
    },
    {
      "name": "CVE-2025-3277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
    },
    {
      "name": "CVE-2025-4609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
    },
    {
      "name": "CVE-2025-4664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
    },
    {
      "name": "CVE-2025-4372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2025-22233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-4918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
    },
    {
      "name": "CVE-2025-4919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
    },
    {
      "name": "CVE-2025-41232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
    },
    {
      "name": "CVE-2025-23165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
    },
    {
      "name": "CVE-2025-23166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
    },
    {
      "name": "CVE-2025-5063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
    },
    {
      "name": "CVE-2025-5064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
    },
    {
      "name": "CVE-2025-5065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
    },
    {
      "name": "CVE-2025-5066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
    },
    {
      "name": "CVE-2025-5067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2022-49728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
    },
    {
      "name": "CVE-2024-58093",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
    },
    {
      "name": "CVE-2025-22018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
    },
    {
      "name": "CVE-2025-22020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
    },
    {
      "name": "CVE-2025-22062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-5263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
    },
    {
      "name": "CVE-2025-5264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
    },
    {
      "name": "CVE-2025-5265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
    },
    {
      "name": "CVE-2025-5266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
    },
    {
      "name": "CVE-2025-5267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
    },
    {
      "name": "CVE-2025-5268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
    },
    {
      "name": "CVE-2025-5270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
    },
    {
      "name": "CVE-2025-5271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
    },
    {
      "name": "CVE-2025-5272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
    },
    {
      "name": "CVE-2025-5281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
    },
    {
      "name": "CVE-2025-5283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
    },
    {
      "name": "CVE-2025-46701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
    },
    {
      "name": "CVE-2025-22021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2025-5068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
    },
    {
      "name": "CVE-2025-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
    },
    {
      "name": "CVE-2025-27144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
    },
    {
      "name": "CVE-2025-49709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
    },
    {
      "name": "CVE-2025-49710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-56433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-29088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
    },
    {
      "name": "CVE-2025-31115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2025-5958",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
    },
    {
      "name": "CVE-2025-5959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
    },
    {
      "name": "CVE-2025-41234",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
    },
    {
      "name": "CVE-2025-49146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
    },
    {
      "name": "CVE-2025-48988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
    },
    {
      "name": "CVE-2025-49124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
    },
    {
      "name": "CVE-2025-49125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
    },
    {
      "name": "CVE-2025-6191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
    },
    {
      "name": "CVE-2025-6192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
    },
    {
      "name": "CVE-2024-53427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2022-49168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2023-42366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
    },
    {
      "name": "CVE-2025-6424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
    },
    {
      "name": "CVE-2025-6425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
    },
    {
      "name": "CVE-2025-6426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
    },
    {
      "name": "CVE-2025-6427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
    },
    {
      "name": "CVE-2025-6429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
    },
    {
      "name": "CVE-2025-6430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
    },
    {
      "name": "CVE-2025-6432",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
    },
    {
      "name": "CVE-2025-6433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
    },
    {
      "name": "CVE-2025-6434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-6555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
    },
    {
      "name": "CVE-2025-6556",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
    },
    {
      "name": "CVE-2025-6557",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
    },
    {
      "name": "CVE-2025-6435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
    },
    {
      "name": "CVE-2025-6436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
    },
    {
      "name": "CVE-2025-6554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2022-49636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
    },
    {
      "name": "CVE-2025-37997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
    },
    {
      "name": "CVE-2025-38000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
    },
    {
      "name": "CVE-2025-38001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
    },
    {
      "name": "CVE-2025-32462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
    },
    {
      "name": "CVE-2025-52520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
    },
    {
      "name": "CVE-2025-53506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
    },
    {
      "name": "CVE-2024-47081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
    },
    {
      "name": "CVE-2025-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
    },
    {
      "name": "CVE-2025-47268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
    },
    {
      "name": "CVE-2025-22227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
    },
    {
      "name": "CVE-2025-6558",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
    },
    {
      "name": "CVE-2025-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
    },
    {
      "name": "CVE-2025-7657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
    },
    {
      "name": "CVE-2025-30749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
    },
    {
      "name": "CVE-2025-30754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
    },
    {
      "name": "CVE-2025-50059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
    },
    {
      "name": "CVE-2025-50106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
    },
    {
      "name": "CVE-2025-50088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2022-21546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
    },
    {
      "name": "CVE-2020-16156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
    },
    {
      "name": "CVE-2025-8010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
    },
    {
      "name": "CVE-2025-8011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
    },
    {
      "name": "CVE-2025-8027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
    },
    {
      "name": "CVE-2025-8028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
    },
    {
      "name": "CVE-2025-8029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
    },
    {
      "name": "CVE-2025-8030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
    },
    {
      "name": "CVE-2025-8031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
    },
    {
      "name": "CVE-2025-8032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
    },
    {
      "name": "CVE-2025-8033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
    },
    {
      "name": "CVE-2025-8034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
    },
    {
      "name": "CVE-2025-8035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
    },
    {
      "name": "CVE-2025-8036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
    },
    {
      "name": "CVE-2025-8037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
    },
    {
      "name": "CVE-2025-8038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
    },
    {
      "name": "CVE-2025-8039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
    },
    {
      "name": "CVE-2025-8040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
    },
    {
      "name": "CVE-2025-8041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
    },
    {
      "name": "CVE-2025-8043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
    },
    {
      "name": "CVE-2025-8044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-45339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-38177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-4877",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
    },
    {
      "name": "CVE-2025-4878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5318",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
    },
    {
      "name": "CVE-2025-5372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-8292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2025-5889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
    },
    {
      "name": "CVE-2025-8576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
    },
    {
      "name": "CVE-2025-8577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
    },
    {
      "name": "CVE-2025-8578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
    },
    {
      "name": "CVE-2025-8579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
    },
    {
      "name": "CVE-2025-8580",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
    },
    {
      "name": "CVE-2025-8581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
    },
    {
      "name": "CVE-2025-8582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
    },
    {
      "name": "CVE-2025-8583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
    },
    {
      "name": "CVE-2025-27210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
    },
    {
      "name": "CVE-2025-27817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
    },
    {
      "name": "CVE-2025-27818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
    },
    {
      "name": "CVE-2025-8879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
    },
    {
      "name": "CVE-2025-8880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
    },
    {
      "name": "CVE-2025-8881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
    },
    {
      "name": "CVE-2025-8882",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
    },
    {
      "name": "CVE-2025-8901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
    },
    {
      "name": "CVE-2025-48989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
    },
    {
      "name": "CVE-2025-7339",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
    },
    {
      "name": "CVE-2025-7783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2024-25260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
    },
    {
      "name": "CVE-2025-1371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
    },
    {
      "name": "CVE-2025-1376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
    },
    {
      "name": "CVE-2025-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-48964",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2025-41242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
    },
    {
      "name": "CVE-2025-9132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
    },
    {
      "name": "CVE-2025-54988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2024-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
    },
    {
      "name": "CVE-2025-55668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-52999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2025-9288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
    },
    {
      "name": "CVE-2005-2541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
    },
    {
      "name": "CVE-2008-5727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
    },
    {
      "name": "CVE-2008-5728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
    },
    {
      "name": "CVE-2008-5729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
    },
    {
      "name": "CVE-2008-5730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
    },
    {
      "name": "CVE-2008-5742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
    },
    {
      "name": "CVE-2011-3374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
    },
    {
      "name": "CVE-2014-4715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
    },
    {
      "name": "CVE-2015-2214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
    },
    {
      "name": "CVE-2016-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
    },
    {
      "name": "CVE-2016-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
    },
    {
      "name": "CVE-2016-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
    },
    {
      "name": "CVE-2016-0694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
    },
    {
      "name": "CVE-2016-2149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
    },
    {
      "name": "CVE-2016-2160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
    },
    {
      "name": "CVE-2016-3418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
    },
    {
      "name": "CVE-2017-10140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
    },
    {
      "name": "CVE-2017-12195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
    },
    {
      "name": "CVE-2017-12629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
    },
    {
      "name": "CVE-2017-3604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
    },
    {
      "name": "CVE-2017-3605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
    },
    {
      "name": "CVE-2017-3606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
    },
    {
      "name": "CVE-2017-3607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
    },
    {
      "name": "CVE-2017-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
    },
    {
      "name": "CVE-2017-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
    },
    {
      "name": "CVE-2017-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
    },
    {
      "name": "CVE-2017-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
    },
    {
      "name": "CVE-2017-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
    },
    {
      "name": "CVE-2017-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
    },
    {
      "name": "CVE-2017-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
    },
    {
      "name": "CVE-2017-3615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
    },
    {
      "name": "CVE-2017-3616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
    },
    {
      "name": "CVE-2017-3617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
    },
    {
      "name": "CVE-2018-1000169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
    },
    {
      "name": "CVE-2018-1196",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
    },
    {
      "name": "CVE-2018-1273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
    },
    {
      "name": "CVE-2019-10782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
    },
    {
      "name": "CVE-2019-9658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
    },
    {
      "name": "CVE-2020-2981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
    },
    {
      "name": "CVE-2021-20298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
    },
    {
      "name": "CVE-2021-20304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
    },
    {
      "name": "CVE-2021-22055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
    },
    {
      "name": "CVE-2021-23169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
    },
    {
      "name": "CVE-2021-3236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
    },
    {
      "name": "CVE-2022-0635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
    },
    {
      "name": "CVE-2022-0667",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
    },
    {
      "name": "CVE-2022-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
    },
    {
      "name": "CVE-2022-39046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
    },
    {
      "name": "CVE-2022-42010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
    },
    {
      "name": "CVE-2022-42011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
    },
    {
      "name": "CVE-2022-42012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
    },
    {
      "name": "CVE-2022-44638",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
    },
    {
      "name": "CVE-2023-31437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
    },
    {
      "name": "CVE-2023-31438",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
    },
    {
      "name": "CVE-2023-31439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
    },
    {
      "name": "CVE-2023-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
    },
    {
      "name": "CVE-2023-39810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
    },
    {
      "name": "CVE-2023-4156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
    },
    {
      "name": "CVE-2023-4320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
    },
    {
      "name": "CVE-2023-43785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
    },
    {
      "name": "CVE-2023-43786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
    },
    {
      "name": "CVE-2023-43787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
    },
    {
      "name": "CVE-2023-46129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
    },
    {
      "name": "CVE-2023-47039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
    },
    {
      "name": "CVE-2023-5189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
    },
    {
      "name": "CVE-2024-11584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
    },
    {
      "name": "CVE-2024-21742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
    },
    {
      "name": "CVE-2024-22047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
    },
    {
      "name": "CVE-2024-2397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
    },
    {
      "name": "CVE-2024-26462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
    },
    {
      "name": "CVE-2024-31047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
    },
    {
      "name": "CVE-2024-3220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
    },
    {
      "name": "CVE-2024-58251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
    },
    {
      "name": "CVE-2024-6174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
    },
    {
      "name": "CVE-2024-7012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
    },
    {
      "name": "CVE-2025-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
    },
    {
      "name": "CVE-2025-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
    },
    {
      "name": "CVE-2025-1372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
    },
    {
      "name": "CVE-2025-24294",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
    },
    {
      "name": "CVE-2025-26519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2025-30258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
    },
    {
      "name": "CVE-2025-31672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-43857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
    },
    {
      "name": "CVE-2025-45582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
    },
    {
      "name": "CVE-2025-45768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
    },
    {
      "name": "CVE-2025-46392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
    },
    {
      "name": "CVE-2025-46394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-5278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-6170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
    },
    {
      "name": "CVE-2025-6297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
    },
    {
      "name": "CVE-2025-7962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-8262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
    },
    {
      "name": "CVE-2025-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
    },
    {
      "name": "CVE-2025-8885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
    },
    {
      "name": "CVE-2025-8916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
    },
    {
      "name": "CVE-2025-9179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
    },
    {
      "name": "CVE-2025-9180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
    },
    {
      "name": "CVE-2025-9181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
    },
    {
      "name": "CVE-2025-9182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
    },
    {
      "name": "CVE-2025-9183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
    },
    {
      "name": "CVE-2025-9184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
    },
    {
      "name": "CVE-2025-9185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
    },
    {
      "name": "CVE-2025-9187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
    },
    {
      "name": "CVE-2025-9308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
    }
  ],
  "initial_release_date": "2025-09-05T00:00:00",
  "last_revision_date": "2025-09-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0756",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-09-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
    },
    {
      "published_at": "2025-09-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
    }
  ]
}
  CERTFR-2025-AVI-0563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411.x antérieures à 9.3.2411.107 | ||
| Splunk | SOAR | Splunk SOAR versions antérieures à 6.4.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Splunk DB Connect | Splunk DB Connect versions antérieures à 4.0.0 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.3.x antérieures à 9.3.5 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.4.x antérieures à 9.4.3 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408.x antérieures à 9.3.2408.117 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.7 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406.x antérieures à 9.2.2406.121 | ||
| Splunk | Universal Forwarder | Splunk Universal Forwarder versions 9.1.x antérieures à 9.1.10 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
 | ||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2411.x ant\u00e9rieures \u00e0 9.3.2411.107",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk SOAR versions ant\u00e9rieures \u00e0 6.4.1",
      "product": {
        "name": "SOAR",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk DB Connect versions ant\u00e9rieures \u00e0 4.0.0",
      "product": {
        "name": "Splunk DB Connect",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.5",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.3",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.3.2408.x ant\u00e9rieures \u00e0 9.3.2408.117",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.7",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Enterprise Cloud versions 9.2.2406.x ant\u00e9rieures \u00e0 9.2.2406.121",
      "product": {
        "name": "Splunk Enterprise",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    },
    {
      "description": "Splunk Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.10",
      "product": {
        "name": "Universal Forwarder",
        "vendor": {
          "name": "Splunk",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2022-30187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-2466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
    },
    {
      "name": "CVE-2025-27414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27414"
    },
    {
      "name": "CVE-2025-20324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20324"
    },
    {
      "name": "CVE-2025-23388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23388"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-20319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20319"
    },
    {
      "name": "CVE-2024-29857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
    },
    {
      "name": "CVE-2023-5363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
    },
    {
      "name": "CVE-2020-28458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-28458"
    },
    {
      "name": "CVE-2025-20321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20321"
    },
    {
      "name": "CVE-2024-45338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
    },
    {
      "name": "CVE-2025-20325",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20325"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2025-23387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23387"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2021-23445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-23445"
    },
    {
      "name": "CVE-2024-48949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
    },
    {
      "name": "CVE-2025-23389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23389"
    },
    {
      "name": "CVE-2024-21538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
    },
    {
      "name": "CVE-2022-35583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35583"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2024-52804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52804"
    },
    {
      "name": "CVE-2025-20300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20300"
    },
    {
      "name": "CVE-2024-45801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45801"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-20323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20323"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38999"
    },
    {
      "name": "CVE-2025-20320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20320"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-45230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45230"
    },
    {
      "name": "CVE-2024-49767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
    },
    {
      "name": "CVE-2024-47875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47875"
    },
    {
      "name": "CVE-2025-20322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-20322"
    },
    {
      "name": "CVE-2024-21272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2024-39338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
    },
    {
      "name": "CVE-2024-21090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-21090"
    },
    {
      "name": "CVE-2013-7489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-7489"
    },
    {
      "name": "CVE-2025-27789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-34064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
    },
    {
      "name": "CVE-2024-52616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
    },
    {
      "name": "CVE-2024-0853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0853"
    },
    {
      "name": "CVE-2025-22952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22952"
    },
    {
      "name": "CVE-2024-32002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    }
  ],
  "initial_release_date": "2025-07-08T00:00:00",
  "last_revision_date": "2025-07-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0563",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
  "vendor_advisories": [
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0708",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0708"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0703",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0703"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0701",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0701"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0706",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0706"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0705",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0705"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0702",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0702"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0712",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0712"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0711",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0711"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0707",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0707"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0710",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0710"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0709",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0709"
    },
    {
      "published_at": "2025-07-07",
      "title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0704",
      "url": "https://advisory.splunk.com/advisories/SVD-2025-0704"
    }
  ]
}
  CERTFR-2025-AVI-0328
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable Security Center. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Tenable | Security Center | Security Center sans le correctif de sécurité Patch SC-202504.2 | 
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
| 
 | |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": " Security Center sans le correctif de s\u00e9curit\u00e9 Patch SC-202504.2",
      "product": {
        "name": "Security Center",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2025-1217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1217"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-6874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6874"
    },
    {
      "name": "CVE-2025-1736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1736"
    },
    {
      "name": "CVE-2024-6197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
    },
    {
      "name": "CVE-2025-1734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1734"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2025-1861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1861"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-1219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1219"
    }
  ],
  "initial_release_date": "2025-04-17T00:00:00",
  "last_revision_date": "2025-04-17T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0328",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-04-17T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable Security Center. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable Security Center",
  "vendor_advisories": [
    {
      "published_at": "2025-04-17",
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2025-04",
      "url": "https://www.tenable.com/security/tns-2025-04"
    }
  ]
}
  opensuse-su-2024:14575-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "curl-8.11.1-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the curl-8.11.1-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-14575",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14575-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-11053 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-11053/"
      }
    ],
    "title": "curl-8.11.1-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-12-13T00:00:00Z",
      "generator": {
        "date": "2024-12-13T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:14575-1",
      "initial_release_date": "2024-12-13T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-12-13T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.11.1-1.1.aarch64",
                "product": {
                  "name": "curl-8.11.1-1.1.aarch64",
                  "product_id": "curl-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-fish-completion-8.11.1-1.1.aarch64",
                "product": {
                  "name": "curl-fish-completion-8.11.1-1.1.aarch64",
                  "product_id": "curl-fish-completion-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-zsh-completion-8.11.1-1.1.aarch64",
                "product": {
                  "name": "curl-zsh-completion-8.11.1-1.1.aarch64",
                  "product_id": "curl-zsh-completion-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.11.1-1.1.aarch64",
                "product": {
                  "name": "libcurl-devel-8.11.1-1.1.aarch64",
                  "product_id": "libcurl-devel-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.11.1-1.1.aarch64",
                "product": {
                  "name": "libcurl-devel-32bit-8.11.1-1.1.aarch64",
                  "product_id": "libcurl-devel-32bit-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-doc-8.11.1-1.1.aarch64",
                "product": {
                  "name": "libcurl-devel-doc-8.11.1-1.1.aarch64",
                  "product_id": "libcurl-devel-doc-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.11.1-1.1.aarch64",
                "product": {
                  "name": "libcurl4-8.11.1-1.1.aarch64",
                  "product_id": "libcurl4-8.11.1-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.11.1-1.1.aarch64",
                "product": {
                  "name": "libcurl4-32bit-8.11.1-1.1.aarch64",
                  "product_id": "libcurl4-32bit-8.11.1-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "curl-8.11.1-1.1.ppc64le",
                  "product_id": "curl-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "curl-fish-completion-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "curl-fish-completion-8.11.1-1.1.ppc64le",
                  "product_id": "curl-fish-completion-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "curl-zsh-completion-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "curl-zsh-completion-8.11.1-1.1.ppc64le",
                  "product_id": "curl-zsh-completion-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-8.11.1-1.1.ppc64le",
                  "product_id": "libcurl-devel-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-32bit-8.11.1-1.1.ppc64le",
                  "product_id": "libcurl-devel-32bit-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-doc-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "libcurl-devel-doc-8.11.1-1.1.ppc64le",
                  "product_id": "libcurl-devel-doc-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "libcurl4-8.11.1-1.1.ppc64le",
                  "product_id": "libcurl4-8.11.1-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.11.1-1.1.ppc64le",
                "product": {
                  "name": "libcurl4-32bit-8.11.1-1.1.ppc64le",
                  "product_id": "libcurl4-32bit-8.11.1-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.11.1-1.1.s390x",
                "product": {
                  "name": "curl-8.11.1-1.1.s390x",
                  "product_id": "curl-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "curl-fish-completion-8.11.1-1.1.s390x",
                "product": {
                  "name": "curl-fish-completion-8.11.1-1.1.s390x",
                  "product_id": "curl-fish-completion-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "curl-zsh-completion-8.11.1-1.1.s390x",
                "product": {
                  "name": "curl-zsh-completion-8.11.1-1.1.s390x",
                  "product_id": "curl-zsh-completion-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.11.1-1.1.s390x",
                "product": {
                  "name": "libcurl-devel-8.11.1-1.1.s390x",
                  "product_id": "libcurl-devel-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.11.1-1.1.s390x",
                "product": {
                  "name": "libcurl-devel-32bit-8.11.1-1.1.s390x",
                  "product_id": "libcurl-devel-32bit-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-doc-8.11.1-1.1.s390x",
                "product": {
                  "name": "libcurl-devel-doc-8.11.1-1.1.s390x",
                  "product_id": "libcurl-devel-doc-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.11.1-1.1.s390x",
                "product": {
                  "name": "libcurl4-8.11.1-1.1.s390x",
                  "product_id": "libcurl4-8.11.1-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.11.1-1.1.s390x",
                "product": {
                  "name": "libcurl4-32bit-8.11.1-1.1.s390x",
                  "product_id": "libcurl4-32bit-8.11.1-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "curl-8.11.1-1.1.x86_64",
                "product": {
                  "name": "curl-8.11.1-1.1.x86_64",
                  "product_id": "curl-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-fish-completion-8.11.1-1.1.x86_64",
                "product": {
                  "name": "curl-fish-completion-8.11.1-1.1.x86_64",
                  "product_id": "curl-fish-completion-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "curl-zsh-completion-8.11.1-1.1.x86_64",
                "product": {
                  "name": "curl-zsh-completion-8.11.1-1.1.x86_64",
                  "product_id": "curl-zsh-completion-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-8.11.1-1.1.x86_64",
                "product": {
                  "name": "libcurl-devel-8.11.1-1.1.x86_64",
                  "product_id": "libcurl-devel-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-32bit-8.11.1-1.1.x86_64",
                "product": {
                  "name": "libcurl-devel-32bit-8.11.1-1.1.x86_64",
                  "product_id": "libcurl-devel-32bit-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl-devel-doc-8.11.1-1.1.x86_64",
                "product": {
                  "name": "libcurl-devel-doc-8.11.1-1.1.x86_64",
                  "product_id": "libcurl-devel-doc-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-8.11.1-1.1.x86_64",
                "product": {
                  "name": "libcurl4-8.11.1-1.1.x86_64",
                  "product_id": "libcurl4-8.11.1-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "libcurl4-32bit-8.11.1-1.1.x86_64",
                "product": {
                  "name": "libcurl4-32bit-8.11.1-1.1.x86_64",
                  "product_id": "libcurl4-32bit-8.11.1-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-8.11.1-1.1.aarch64"
        },
        "product_reference": "curl-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-8.11.1-1.1.ppc64le"
        },
        "product_reference": "curl-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-8.11.1-1.1.s390x"
        },
        "product_reference": "curl-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-8.11.1-1.1.x86_64"
        },
        "product_reference": "curl-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-fish-completion-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.aarch64"
        },
        "product_reference": "curl-fish-completion-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-fish-completion-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.ppc64le"
        },
        "product_reference": "curl-fish-completion-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-fish-completion-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.s390x"
        },
        "product_reference": "curl-fish-completion-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-fish-completion-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.x86_64"
        },
        "product_reference": "curl-fish-completion-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-zsh-completion-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.aarch64"
        },
        "product_reference": "curl-zsh-completion-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-zsh-completion-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.ppc64le"
        },
        "product_reference": "curl-zsh-completion-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-zsh-completion-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.s390x"
        },
        "product_reference": "curl-zsh-completion-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "curl-zsh-completion-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.x86_64"
        },
        "product_reference": "curl-zsh-completion-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.aarch64"
        },
        "product_reference": "libcurl-devel-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.ppc64le"
        },
        "product_reference": "libcurl-devel-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.s390x"
        },
        "product_reference": "libcurl-devel-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.x86_64"
        },
        "product_reference": "libcurl-devel-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.aarch64"
        },
        "product_reference": "libcurl-devel-32bit-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.ppc64le"
        },
        "product_reference": "libcurl-devel-32bit-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.s390x"
        },
        "product_reference": "libcurl-devel-32bit-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-32bit-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.x86_64"
        },
        "product_reference": "libcurl-devel-32bit-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-doc-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.aarch64"
        },
        "product_reference": "libcurl-devel-doc-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-doc-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.ppc64le"
        },
        "product_reference": "libcurl-devel-doc-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-doc-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.s390x"
        },
        "product_reference": "libcurl-devel-doc-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl-devel-doc-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.x86_64"
        },
        "product_reference": "libcurl-devel-doc-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.aarch64"
        },
        "product_reference": "libcurl4-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.ppc64le"
        },
        "product_reference": "libcurl4-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.s390x"
        },
        "product_reference": "libcurl4-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.x86_64"
        },
        "product_reference": "libcurl4-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.11.1-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.aarch64"
        },
        "product_reference": "libcurl4-32bit-8.11.1-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.11.1-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.ppc64le"
        },
        "product_reference": "libcurl4-32bit-8.11.1-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.11.1-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.s390x"
        },
        "product_reference": "libcurl4-32bit-8.11.1-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libcurl4-32bit-8.11.1-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.x86_64"
        },
        "product_reference": "libcurl4-32bit-8.11.1-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-11053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:curl-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:curl-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:curl-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:curl-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.x86_64",
          "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.aarch64",
          "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.ppc64le",
          "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.s390x",
          "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-11053",
          "url": "https://www.suse.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234068 for CVE-2024-11053",
          "url": "https://bugzilla.suse.com/1234068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:curl-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:curl-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-fish-completion-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:curl-zsh-completion-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-32bit-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl-devel-doc-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl4-32bit-8.11.1-1.1.x86_64",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.aarch64",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.ppc64le",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.s390x",
            "openSUSE Tumbleweed:libcurl4-8.11.1-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-12-13T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-11053"
    }
  ]
}
  icsa-23-348-10
Vulnerability from csaf_cisa
Notes
{
  "document": {
    "acknowledgments": [
      {
        "organization": "Siemens ProductCERT",
        "summary": "reporting these vulnerabilities to CISA."
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Disclosure is not limited",
      "tlp": {
        "label": "WHITE",
        "url": "https://us-cert.cisa.gov/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Multiple vulnerabilities have been identified in the additional GNU/Linux subsystem of the firmware version  \u003e= V3.1.0 and \u003c V3.1.5 for the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP (incl. SIPLUS variant).\n\nThese GNU/Linux vulnerabilities have been externally identified. \nSiemens has released new versions for the affected products and recommends to update to the latest versions.\n\nNote: This SSA advises vulnerabilities for firmware version V3.1 only; for versions \u003c V3.1 refer to Siemens Security Bulletin SSB-439005 (\nhttps://cert-portal.siemens.com/productcert/html/ssb-439005.html).",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
        "title": "General Recommendations"
      },
      {
        "category": "general",
        "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.",
        "title": "Terms of Use"
      },
      {
        "category": "legal_disclaimer",
        "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
        "title": "Legal Notice"
      },
      {
        "category": "other",
        "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-398330 from a direct conversion of the vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory.  Further, CISA does not endorse any commercial product or service.  Please contact Siemens ProductCERT directly for any questions regarding this advisory.",
        "title": "Advisory Conversion Disclaimer"
      },
      {
        "category": "other",
        "text": "Critical Manufacturing, Transportation Systems, Energy, Healthcare and Public Health, Financial Services, Government Services and Facilities",
        "title": "Critical infrastructure sectors"
      },
      {
        "category": "other",
        "text": "Worldwide",
        "title": "Countries/areas deployed"
      },
      {
        "category": "other",
        "text": "Germany",
        "title": "Company headquarters location"
      },
      {
        "category": "general",
        "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
        "title": "Recommended Practices"
      },
      {
        "category": "general",
        "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
        "title": "Recommended Practices"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "central@cisa.dhs.gov",
      "name": "CISA",
      "namespace": "https://www.cisa.gov/"
    },
    "references": [
      {
        "category": "self",
        "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP  \u003e= V3.1.0 and \u003c V3.1.5 - CSAF Version",
        "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-398330.json"
      },
      {
        "category": "self",
        "summary": "SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP  \u003e= V3.1.0 and \u003c V3.1.5 - HTML Version",
        "url": "https://cert-portal.siemens.com/productcert/html/ssa-398330.html"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-348-10 JSON",
        "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2023/icsa-23-348-10.json"
      },
      {
        "category": "self",
        "summary": "ICS Advisory ICSA-23-348-10 - Web Version",
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-10"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/topics/industrial-control-systems"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
      },
      {
        "category": "external",
        "summary": "Recommended Practices",
        "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
      }
    ],
    "title": "Siemens SIMATIC S7-1500",
    "tracking": {
      "current_release_date": "2025-08-12T00:00:00.000000Z",
      "generator": {
        "date": "2025-08-14T23:08:55.270985Z",
        "engine": {
          "name": "CISA CSAF Generator",
          "version": "1.0.0"
        }
      },
      "id": "ICSA-23-348-10",
      "initial_release_date": "2023-12-12T00:00:00.000000Z",
      "revision_history": [
        {
          "date": "2023-12-12T00:00:00.000000Z",
          "legacy_version": "1.0",
          "number": "1",
          "summary": "Publication Date"
        },
        {
          "date": "2024-01-09T00:00:00.000000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Added CVE-2021-44879, CVE-2023-46218, CVE-2023-46219, and CVE-2023-48795"
        },
        {
          "date": "2024-02-13T00:00:00.000000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Added CVE-2023-45898, CVE-2023-46862, CVE-2023-6121, CVE-2023-6817, CVE-2023-6931, CVE-2023-6932, CVE-2024-0584"
        },
        {
          "date": "2024-03-12T00:00:00.000000Z",
          "legacy_version": "1.3",
          "number": "4",
          "summary": "Added CVE-2023-52425, CVE-2023-52426, CVE-2023-45918"
        },
        {
          "date": "2024-04-09T00:00:00.000000Z",
          "legacy_version": "1.4",
          "number": "5",
          "summary": "Added CVE-2024-28757"
        },
        {
          "date": "2024-05-14T00:00:00.000000Z",
          "legacy_version": "1.5",
          "number": "6",
          "summary": "Added CVE-2024-2004, CVE-2024-2379, CVE-2024-2398, CVE-2024-2466, CVE-2024-2511, CVE-2024-28085, CVE-2024-28182, CVE-2024-28834, CVE-2024-28835"
        },
        {
          "date": "2024-06-11T00:00:00.000000Z",
          "legacy_version": "1.6",
          "number": "7",
          "summary": "Added CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-34459"
        },
        {
          "date": "2024-07-09T00:00:00.000000Z",
          "legacy_version": "1.7",
          "number": "8",
          "summary": "Added CVE-2024-5535, CVE-2024-5742"
        },
        {
          "date": "2024-08-13T00:00:00.000000Z",
          "legacy_version": "1.8",
          "number": "9",
          "summary": "Added CVE-2017-15422, CVE-2024-7264, CVE-2024-37370, CVE-2024-37371"
        },
        {
          "date": "2024-10-08T00:00:00.000000Z",
          "legacy_version": "1.9",
          "number": "10",
          "summary": "Added CVE-2024-6409, CVE-2024-8096, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492"
        },
        {
          "date": "2024-11-12T00:00:00.000000Z",
          "legacy_version": "2.0",
          "number": "11",
          "summary": "Added CVE-2024-2236, CVE-2024-9143"
        },
        {
          "date": "2024-12-10T00:00:00.000000Z",
          "legacy_version": "2.1",
          "number": "12",
          "summary": "Added CVE-2024-50602, CVE-2024-52533"
        },
        {
          "date": "2025-01-14T00:00:00.000000Z",
          "legacy_version": "2.2",
          "number": "13",
          "summary": "Added CVE-2024-11053"
        },
        {
          "date": "2025-02-11T00:00:00.000000Z",
          "legacy_version": "2.3",
          "number": "14",
          "summary": "Added multiple CVEs"
        },
        {
          "date": "2025-03-11T00:00:00.000000Z",
          "legacy_version": "2.4",
          "number": "15",
          "summary": "Added CVE-2023-52622, CVE-2024-12133, -12243, -26645, -26671, -26679, -26772, -26773, -26777, -26805, -26923, -27020, -27032, -36017, -36484, -36904, -36905, -36934, -39487, -41046, -42106, -42131, -42154, -43871, -44944, -44965, -46743, -46745, -46750, -47684, -47701, -47737, -49881, -49884, -49948, -49949, -49952, -49997, -50006, -50040, -50045, -50251, -50262, -50299, -50301, -53057, -53140, -53165, -53217, CVE-2025-0167, -0395, -0665, -0725, -26465, -26466"
        },
        {
          "date": "2025-04-08T00:00:00.000000Z",
          "legacy_version": "2.5",
          "number": "16",
          "summary": "Added CVE-2025-21694, CVE-2025-1390, CVE-2024-8176, CVE-2024-57901, CVE-2024-57884, CVE-2024-56780, CVE-2024-56779, CVE-2024-56770, CVE-2024-56650, CVE-2024-56644, CVE-2024-56606, CVE-2024-56601, CVE-2024-56600, CVE-2024-56570, CVE-2024-56569, CVE-2024-53164, CVE-2024-53124, CVE-2024-52332, CVE-2024-48881, CVE-2024-47707, CVE-2024-12243"
        },
        {
          "date": "2025-06-10T00:00:00.000000Z",
          "legacy_version": "2.6",
          "number": "17",
          "summary": "Added fix for SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP incl. SIPLUS variants"
        },
        {
          "date": "2025-08-12T00:00:00.000000Z",
          "legacy_version": "2.7",
          "number": "18",
          "summary": "Removed CVE-2021-41617, CVE-2023-28531, CVE-2023-38545, CVE-2023-38546, CVE-2023-44487, CVE-2023-4527, CVE-2023-46218, CVE-2023-46219, CVE-2023-4806, CVE-2023-48795, CVE-2023-4911, CVE-2024-12133, CVE-2024-12243, CVE-2024-28085, CVE-2024-2961, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-37370, CVE-2024-37371, CVE-2024-45490, CVE-2024-45491, CVE-2024-45492, CVE-2025-26465, CVE-2025-46836 as they are not fixed in V3.1.5 and advised in SSA-082556"
        }
      ],
      "status": "final",
      "version": "18"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)",
                  "product_id": "CSAFPID-0001",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)",
                  "product_id": "CSAFPID-0002",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4AX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (6ES7518-4AX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)",
                  "product_id": "CSAFPID-0003",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AB0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AB0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)",
                  "product_id": "CSAFPID-0004",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6ES7518-4FX00-1AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP (6ES7518-4FX00-1AC0)"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:intdot/\u003e=3.1.0|\u003c3.1.5",
                "product": {
                  "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)",
                  "product_id": "CSAFPID-0005",
                  "product_identification_helper": {
                    "model_numbers": [
                      "6AG1518-4AX00-4AC0"
                    ]
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "SIPLUS S7-1500 CPU 1518-4 PN/DP MFP (6AG1518-4AX00-4AC0)"
          }
        ],
        "category": "vendor",
        "name": "Siemens"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2013-0340",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2013-0340"
    },
    {
      "cve": "CVE-2013-4235",
      "cwe": {
        "id": "CWE-367",
        "name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2013-4235"
    },
    {
      "cve": "CVE-2014-7209",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "run-mailcap in the Debian mime-support package before 3.52-1+deb7u1 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2014-7209"
    },
    {
      "cve": "CVE-2015-20107",
      "cwe": {
        "id": "CWE-77",
        "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2015-20107"
    },
    {
      "cve": "CVE-2016-3189",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file, related to block ends set to before the start of the block.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-3189"
    },
    {
      "cve": "CVE-2016-3709",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Possible cross-site scripting vulnerability in libxml after commit 960f0e2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-3709"
    },
    {
      "cve": "CVE-2016-4658",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-4658"
    },
    {
      "cve": "CVE-2016-5131",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-5131"
    },
    {
      "cve": "CVE-2016-9318",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-9318"
    },
    {
      "cve": "CVE-2016-10228",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-10228"
    },
    {
      "cve": "CVE-2016-10739",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2016-10739"
    },
    {
      "cve": "CVE-2017-0663",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-0663"
    },
    {
      "cve": "CVE-2017-7375",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-7375"
    },
    {
      "cve": "CVE-2017-7376",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-7376"
    },
    {
      "cve": "CVE-2017-9047",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-9047"
    },
    {
      "cve": "CVE-2017-9048",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-9048"
    },
    {
      "cve": "CVE-2017-9049",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-9049"
    },
    {
      "cve": "CVE-2017-9050",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-9050"
    },
    {
      "cve": "CVE-2017-15422",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Integer overflow in international date handling in International Components for Unicode (ICU) for C/C++ before 60.1, as used in V8 in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-15422"
    },
    {
      "cve": "CVE-2017-16931",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "parser.c in libxml2 before 2.9.5 mishandles parameter-entity references because the NEXTL macro calls the xmlParserHandlePEReference function in the case of a \u0027%\u0027 character in a DTD name.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-16931"
    },
    {
      "cve": "CVE-2017-16932",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-16932"
    },
    {
      "cve": "CVE-2017-17512",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sensible-browser in sensible-utils before 0.0.11 does not validate strings before launching the program specified by the BROWSER environment variable, which allows remote attackers to conduct argument-injection attacks via a crafted URL, as demonstrated by a --proxy-pac-file argument.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-17512"
    },
    {
      "cve": "CVE-2017-18258",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2017-18258"
    },
    {
      "cve": "CVE-2018-0495",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-0495"
    },
    {
      "cve": "CVE-2018-12886",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-12886"
    },
    {
      "cve": "CVE-2018-14404",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-14404"
    },
    {
      "cve": "CVE-2018-14567",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-14567"
    },
    {
      "cve": "CVE-2018-18928",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "International Components for Unicode (ICU) for C/C++ 63.1 has an integer overflow in number::impl::DecimalQuantity::toScientificString() in i18n/number_decimalquantity.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-18928"
    },
    {
      "cve": "CVE-2018-19591",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-19591"
    },
    {
      "cve": "CVE-2018-20482",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user\u0027s process (e.g., a system backup running as root).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-20482"
    },
    {
      "cve": "CVE-2018-20843",
      "cwe": {
        "id": "CWE-611",
        "name": "Improper Restriction of XML External Entity Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat in Expat before 2.2.7, XML input including XML names that contain a large number of colons could make the XML parser consume a high amount of RAM and CPU resources while processing (enough to be usable for denial-of-service attacks).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-20843"
    },
    {
      "cve": "CVE-2018-25032",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2018-25032"
    },
    {
      "cve": "CVE-2019-3855",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3855"
    },
    {
      "cve": "CVE-2019-3856",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw, which could lead to an out of bounds write, was discovered in libssh2 before 1.8.1 in the way keyboard prompt requests are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3856"
    },
    {
      "cve": "CVE-2019-3857",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3857"
    },
    {
      "cve": "CVE-2019-3858",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 when a specially crafted SFTP packet is received from the server. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3858"
    },
    {
      "cve": "CVE-2019-3859",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the _libssh2_packet_require and _libssh2_packet_requirev functions. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3859"
    },
    {
      "cve": "CVE-2019-3860",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SFTP packets with empty payloads are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3860"
    },
    {
      "cve": "CVE-2019-3861",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH packets with a padding length value greater than the packet length are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3861"
    },
    {
      "cve": "CVE-2019-3862",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no payload are parsed. A remote attacker who compromises a SSH server may be able to cause a Denial of Service or read data in the client memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3862"
    },
    {
      "cve": "CVE-2019-3863",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in libssh2 before 1.8.1. A server could send a multiple keyboard interactive response messages whose total length are greater than unsigned char max characters. This value is used as an index to copy memory causing in an out of bounds memory write error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-3863"
    },
    {
      "cve": "CVE-2019-5018",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5018"
    },
    {
      "cve": "CVE-2019-5094",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5094"
    },
    {
      "cve": "CVE-2019-5188",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack, resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5188"
    },
    {
      "cve": "CVE-2019-5435",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow in curl\u0027s URL API results in a buffer overflow in libcurl 7.62.0 to and including 7.64.1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5435"
    },
    {
      "cve": "CVE-2019-5436",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap buffer overflow in the TFTP receiving code allows for DoS or arbitrary code execution in libcurl versions 7.19.4 through 7.64.1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5436"
    },
    {
      "cve": "CVE-2019-5443",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl \u003c= 7.65.1 automatically run the code (as an openssl \"engine\") on invocation. If that curl is invoked by a privileged user it can do anything it wants.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5443"
    },
    {
      "cve": "CVE-2019-5481",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Double-free vulnerability in the FTP-kerberos code in cURL 7.52.0 to 7.65.3.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5481"
    },
    {
      "cve": "CVE-2019-5482",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Heap buffer overflow in the TFTP protocol handler in cURL 7.19.4 to 7.65.3.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-5482"
    },
    {
      "cve": "CVE-2019-6109",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-6109"
    },
    {
      "cve": "CVE-2019-6110",
      "cwe": {
        "id": "CWE-838",
        "name": "Inappropriate Encoding for Output Context"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-6110"
    },
    {
      "cve": "CVE-2019-6111",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-6111"
    },
    {
      "cve": "CVE-2019-6488",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The string component in the GNU C Library (aka glibc or libc6) through 2.28, when running on the x32 architecture, incorrectly attempts to use a 64-bit register for size_t in assembly codes, which can lead to a segmentation fault or possibly unspecified other impact, as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-6488"
    },
    {
      "cve": "CVE-2019-7309",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-7309"
    },
    {
      "cve": "CVE-2019-8457",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-8457"
    },
    {
      "cve": "CVE-2019-9169",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9169"
    },
    {
      "cve": "CVE-2019-9636",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 2.7.x through 2.7.16 and 3.x through 3.7.2 is affected by: Improper Handling of Unicode Encoding (with an incorrect netloc) during NFKC normalization. The impact is: Information disclosure (credentials, cookies, etc. that are cached against a given hostname). The components are: urllib.parse.urlsplit, urllib.parse.urlparse. The attack vector is: A specially crafted URL could be incorrectly parsed to locate cookies or authentication data and send that information to a different host than when parsed correctly. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.7, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.3, v3.7.3rc1, v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9636"
    },
    {
      "cve": "CVE-2019-9674",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9674"
    },
    {
      "cve": "CVE-2019-9740",
      "cwe": {
        "id": "CWE-93",
        "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9740"
    },
    {
      "cve": "CVE-2019-9923",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL pointer dereference when parsing certain archives that have malformed extended headers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9923"
    },
    {
      "cve": "CVE-2019-9936",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.27.2, running fts5 prefix queries inside a transaction could trigger a heap-based buffer over-read in fts5HashEntrySort in sqlite3.c, which may lead to an information leak. This is related to ext/fts5/fts5_hash.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9936"
    },
    {
      "cve": "CVE-2019-9937",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.27.2, interleaving reads and writes in a single transaction with an fts5 virtual table will lead to a NULL Pointer Dereference in fts5ChunkIterate in sqlite3.c. This is related to ext/fts5/fts5_hash.c and ext/fts5/fts5_index.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9937"
    },
    {
      "cve": "CVE-2019-9947",
      "cwe": {
        "id": "CWE-93",
        "name": "Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9947"
    },
    {
      "cve": "CVE-2019-9948",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen(\u0027local_file:///etc/passwd\u0027) call.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-9948"
    },
    {
      "cve": "CVE-2019-10160",
      "cwe": {
        "id": "CWE-172",
        "name": "Encoding Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-10160"
    },
    {
      "cve": "CVE-2019-11360",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A buffer overflow in iptables-restore in netfilter iptables 1.8.2 allows an attacker to (at least) crash the program or potentially gain code execution via a specially crafted iptables-save file. This is related to add_param_to_argv in xshared.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-11360"
    },
    {
      "cve": "CVE-2019-12290",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusion of certain punycoded Unicode characters (that would be discarded when converted first to a Unicode label and then back to an ASCII label), arbitrary domains can be impersonated.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-12290"
    },
    {
      "cve": "CVE-2019-12900",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-12900"
    },
    {
      "cve": "CVE-2019-12904",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Libgcrypt 1.8.4, the C implementation of AES is vulnerable to a flush-and-reload side-channel attack because physical addresses are available to other processes. (The C implementation is used on platforms where an assembly-language implementation is unavailable.) NOTE: the vendor\u0027s position is that the issue report cannot be validated because there is no description of an attack",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-12904"
    },
    {
      "cve": "CVE-2019-13057",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the server in OpenLDAP before 2.4.48. When the server administrator delegates rootDN (database admin) privileges for certain databases but wants to maintain isolation (e.g., for multi-tenant deployments), slapd does not properly stop a rootDN from requesting authorization as an identity from another database during a SASL bind or with a proxyAuthz (RFC 4370) control. (It is not a common configuration to deploy a system where the server administrator and a DB administrator enjoy different levels of trust.)",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-13057"
    },
    {
      "cve": "CVE-2019-13565",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in OpenLDAP 2.x before 2.4.48. When using SASL authentication and session encryption, and relying on the SASL security layers in slapd access controls, it is possible to obtain access that would otherwise be denied via a simple bind for any identity covered in those ACLs. After the first SASL bind is completed, the sasl_ssf value is retained for all new non-SASL connections. Depending on the ACL configuration, this can affect different types of operations (searches, modifications, etc.). In other words, a successful authorization step completed by one user affects the authorization requirement for a different user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-13565"
    },
    {
      "cve": "CVE-2019-13627",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-13627"
    },
    {
      "cve": "CVE-2019-15847",
      "cwe": {
        "id": "CWE-331",
        "name": "Insufficient Entropy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-15847"
    },
    {
      "cve": "CVE-2019-15903",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat before 2.2.8, crafted XML input could fool the parser into changing from DTD parsing to document parsing too early; a consecutive call to XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber) then resulted in a heap-based buffer over-read.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-15903"
    },
    {
      "cve": "CVE-2019-16056",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in Python through 2.7.16, 3.x through 3.5.7, 3.6.x through 3.6.9, and 3.7.x through 3.7.4. The email module wrongly parses email addresses that contain multiple @ characters. An application that uses the email module and implements some kind of checks on the From/To headers of a message could be tricked into accepting an email address that should be denied. An attack may be the same as in CVE-2019-11340; however, this CVE applies to Python more generally.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-16056"
    },
    {
      "cve": "CVE-2019-16168",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite through 3.29.0, whereLoopAddBtreeIndex in sqlite3.c can crash a browser or other application because of missing validation of a sqlite_stat1 sz field, aka a \"severe division by zero in the query planner.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-16168"
    },
    {
      "cve": "CVE-2019-16905",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenSSH 7.7 through 7.9 and 8.x before 8.1, when compiled with an experimental key type, has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions, and there is no supported way to enable it when building portable OpenSSH.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-16905"
    },
    {
      "cve": "CVE-2019-17498",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-17498"
    },
    {
      "cve": "CVE-2019-17543",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "LZ4 before 1.9.2 has a heap-based buffer overflow in LZ4_write32 (related to LZ4_compress_destSize), affecting applications that call LZ4_compress_fast with a large input. (This issue can also lead to data corruption.) NOTE: the vendor states \"only a few specific / uncommon usages of the API are at risk.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-17543"
    },
    {
      "cve": "CVE-2019-17594",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a heap-based buffer over-read in the _nc_find_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-17594"
    },
    {
      "cve": "CVE-2019-17595",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a heap-based buffer over-read in the fmt_entry function in tinfo/comp_hash.c in the terminfo library in ncurses before 6.1-20191012.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-17595"
    },
    {
      "cve": "CVE-2019-18224",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "idn2_to_ascii_4i in lib/lookup.c in GNU libidn2 before 2.1.1 has a heap-based buffer overflow via a long domain string.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-18224"
    },
    {
      "cve": "CVE-2019-18276",
      "cwe": {
        "id": "CWE-273",
        "name": "Improper Check for Dropped Privileges"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support \"saved UID\" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use \"enable -f\" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-18276"
    },
    {
      "cve": "CVE-2019-18348",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1; v3.6.11, v3.6.11rc1, v3.6.12; v3.7.8, v3.7.8rc1, v3.7.9; v3.8.3, v3.8.3rc1, v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-18348"
    },
    {
      "cve": "CVE-2019-19126",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19126"
    },
    {
      "cve": "CVE-2019-19242",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles pExpr-\u003ey.pTab, as demonstrated by the TK_COLUMN case in sqlite3ExprCodeTarget in expr.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19242"
    },
    {
      "cve": "CVE-2019-19244",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Select in select.c in SQLite 3.30.1 allows a crash if a sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19244"
    },
    {
      "cve": "CVE-2019-19317",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19317"
    },
    {
      "cve": "CVE-2019-19603",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19603"
    },
    {
      "cve": "CVE-2019-19645",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19645"
    },
    {
      "cve": "CVE-2019-19646",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19646"
    },
    {
      "cve": "CVE-2019-19880",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "exprListAppendList in window.c in SQLite 3.30.1 allows attackers to trigger an invalid pointer dereference because constant integer values in ORDER BY clauses of window definitions are mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19880"
    },
    {
      "cve": "CVE-2019-19906",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19906"
    },
    {
      "cve": "CVE-2019-19923",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "flattenSubquery in select.c in SQLite 3.30.1 mishandles certain uses of SELECT DISTINCT involving a LEFT JOIN in which the right-hand side is a view. This can cause a NULL pointer dereference (or incorrect results).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19923"
    },
    {
      "cve": "CVE-2019-19924",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.30.1 mishandles certain parser-tree rewriting, related to expr.c, vdbeaux.c, and window.c. This is caused by incorrect sqlite3WindowRewrite() error handling.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19924"
    },
    {
      "cve": "CVE-2019-19925",
      "cwe": {
        "id": "CWE-434",
        "name": "Unrestricted Upload of File with Dangerous Type"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zipfileUpdate in ext/misc/zipfile.c in SQLite 3.30.1 mishandles a NULL pathname during an update of a ZIP archive.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19925"
    },
    {
      "cve": "CVE-2019-19926",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "multiSelect in select.c in SQLite 3.30.1 mishandles certain errors during parsing, as demonstrated by errors from sqlite3WindowRewrite() calls. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-19880.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19926"
    },
    {
      "cve": "CVE-2019-19956",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19956"
    },
    {
      "cve": "CVE-2019-19959",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/misc/zipfile.c in SQLite 3.30.1 mishandles certain uses of INSERT INTO in situations involving embedded \u0027\\0\u0027 characters in filenames, leading to a memory-management error that can be detected by (for example) valgrind.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-19959"
    },
    {
      "cve": "CVE-2019-20218",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "selectExpander in select.c in SQLite 3.30.1 proceeds with WITH stack unwinding even after a parsing error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-20218"
    },
    {
      "cve": "CVE-2019-20367",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nlist.c in libbsd before 0.10.0 has an out-of-bounds read during a comparison for a symbol name from the string table (strtab).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-20367"
    },
    {
      "cve": "CVE-2019-20388",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-20388"
    },
    {
      "cve": "CVE-2019-20795",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-20795"
    },
    {
      "cve": "CVE-2019-20907",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-20907"
    },
    {
      "cve": "CVE-2019-25013",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-25013"
    },
    {
      "cve": "CVE-2019-1010022",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-1010022"
    },
    {
      "cve": "CVE-2019-1010023",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-1010023"
    },
    {
      "cve": "CVE-2019-1010024",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate \"this is being treated as a non-security bug and no real threat.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-1010024"
    },
    {
      "cve": "CVE-2019-1010025",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor\u0027s position is \"ASLR bypass itself is not a vulnerability.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-1010025"
    },
    {
      "cve": "CVE-2019-1010180",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2019-1010180"
    },
    {
      "cve": "CVE-2020-1712",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-1712"
    },
    {
      "cve": "CVE-2020-1751",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-1751"
    },
    {
      "cve": "CVE-2020-1752",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-1752"
    },
    {
      "cve": "CVE-2020-6096",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-6096"
    },
    {
      "cve": "CVE-2020-7595",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-7595"
    },
    {
      "cve": "CVE-2020-8169",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcurl library versions 7.62.0 to and including  7.70.0 are vulnerable to an information disclosure vulnerability that can lead to a partial password being leaked over the network and to the DNS server(s).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8169"
    },
    {
      "cve": "CVE-2020-8177",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.20.0 through 7.70.0 is vulnerable to improper restriction of names for files and other resources that can lead too overwriting a local file when the -J flag is used.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8177"
    },
    {
      "cve": "CVE-2020-8231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Due to use of a dangling pointer, libcurl 7.29.0 through 7.71.1 can use the wrong connection when sending data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8231"
    },
    {
      "cve": "CVE-2020-8284",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into connecting back to a given IP address and port, and this way potentially make curl extract information about services that are otherwise private and not disclosed, for example doing port scanning and service banner extractions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8284"
    },
    {
      "cve": "CVE-2020-8285",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.21.0 to and including 7.73.0 is vulnerable to uncontrolled recursion due to a stack overflow issue in FTP wildcard match parsing.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8285"
    },
    {
      "cve": "CVE-2020-8286",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcurl library versions 7.41.0 to and including  7.73.0 are vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. This vulnerability could allow an attacker to pass a revoked certificate as valid.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8286"
    },
    {
      "cve": "CVE-2020-8315",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python (CPython) 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1, an insecure dependency load upon launch on Windows 7 may result in an attacker\u0027s copy of api-ms-win-core-path-l1-1-0.dll being loaded and used instead of the system\u0027s copy. Windows 8 and later are unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8315"
    },
    {
      "cve": "CVE-2020-8492",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-8492"
    },
    {
      "cve": "CVE-2020-9327",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.31.1, isAuxiliaryVtabOperator allows attackers to trigger a NULL pointer dereference and segmentation fault because of generated column optimizations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-9327"
    },
    {
      "cve": "CVE-2020-10029",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-10029"
    },
    {
      "cve": "CVE-2020-10531",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in International Components for Unicode (ICU) for C/C++ through 66.1. An integer overflow, leading to a heap-based buffer overflow, exists in the UnicodeString::doAppend() function in common/unistr.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-10531"
    },
    {
      "cve": "CVE-2020-10543",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-10543"
    },
    {
      "cve": "CVE-2020-10735",
      "cwe": {
        "id": "CWE-704",
        "name": "Incorrect Type Conversion or Cast"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-10735"
    },
    {
      "cve": "CVE-2020-10878",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Perl before 5.30.3 has an integer overflow related to mishandling of a \"PL_regkind[OP(n)] == NOTHING\" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-10878"
    },
    {
      "cve": "CVE-2020-11501",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 \u0027\\0\u0027 bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-11501"
    },
    {
      "cve": "CVE-2020-11655",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object\u0027s initialization is mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-11655"
    },
    {
      "cve": "CVE-2020-11656",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-11656"
    },
    {
      "cve": "CVE-2020-12062",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The scp client in OpenSSH 8.2 incorrectly sends duplicate responses to the server upon a utimes system call failure, which allows a malicious unprivileged user on the remote server to overwrite arbitrary files in the client\u0027s download directory by creating a crafted subdirectory anywhere on the remote server. The victim must use the command scp -rp to download a file hierarchy containing, anywhere inside, this crafted subdirectory. NOTE: the vendor points out that \"this attack can achieve no more than a hostile peer is already able to achieve within the scp protocol\" and \"utimes does not fail under normal circumstances.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-12062"
    },
    {
      "cve": "CVE-2020-12243",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters with nested boolean expressions can result in denial of service (daemon crash).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running (for details refer to the updated security manual of WinCC OA).",
          "product_ids": [
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-12243"
    },
    {
      "cve": "CVE-2020-12723",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-12723"
    },
    {
      "cve": "CVE-2020-12762",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-12762"
    },
    {
      "cve": "CVE-2020-13434",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13434"
    },
    {
      "cve": "CVE-2020-13435",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13435"
    },
    {
      "cve": "CVE-2020-13529",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13529"
    },
    {
      "cve": "CVE-2020-13630",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13630"
    },
    {
      "cve": "CVE-2020-13631",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13631"
    },
    {
      "cve": "CVE-2020-13632",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13632"
    },
    {
      "cve": "CVE-2020-13776",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13776"
    },
    {
      "cve": "CVE-2020-13777",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GnuTLS 3.6.x before 3.6.14 uses incorrect cryptography for encrypting a session ticket (a loss of confidentiality in TLS 1.2, and an authentication bypass in TLS 1.3). The earliest affected version is 3.6.4 (2018-09-24) because of an error in a 2018-09-18 commit. Until the first key rotation, the TLS server always uses wrong data in place of an encryption key derived from an application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13777"
    },
    {
      "cve": "CVE-2020-13871",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-13871"
    },
    {
      "cve": "CVE-2020-14145",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-14145"
    },
    {
      "cve": "CVE-2020-14422",
      "cwe": {
        "id": "CWE-682",
        "name": "Incorrect Calculation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes, which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects, and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10, v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4, v3.8.4rc1, v3.8.5, v3.8.6, v3.8.6rc1; v3.9.0, v3.9.0b4, v3.9.0b5, v3.9.0rc1, v3.9.0rc2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-14422"
    },
    {
      "cve": "CVE-2020-15358",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-15358"
    },
    {
      "cve": "CVE-2020-15523",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python 3.6 through 3.6.10, 3.7 through 3.7.8, 3.8 through 3.8.4rc1, and 3.9 through 3.9.0b4 on Windows, a Trojan horse python3.dll might be used in cases where CPython is embedded in a native application. This occurs because python3X.dll may use an invalid search path for python3.dll loading (after Py_SetPath has been used). NOTE: this issue CANNOT occur when using python.exe from a standard (non-embedded) Python installation on Windows.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-15523"
    },
    {
      "cve": "CVE-2020-15778",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-15778"
    },
    {
      "cve": "CVE-2020-15801",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python 3.8.4, sys.path restrictions specified in a python38._pth file are ignored, allowing code to be loaded from arbitrary locations. The \u003cexecutable-name\u003e._pth file (e.g., the python._pth file) is not affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-15801"
    },
    {
      "cve": "CVE-2020-19185",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19185"
    },
    {
      "cve": "CVE-2020-19186",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in _nc_find_entry function in tinfo/comp_hash.c:66 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19186"
    },
    {
      "cve": "CVE-2020-19187",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1100 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19187"
    },
    {
      "cve": "CVE-2020-19188",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in fmt_entry function in progs/dump_entry.c:1116 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19188"
    },
    {
      "cve": "CVE-2020-19189",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in postprocess_terminfo function in tinfo/parse_entry.c:997 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19189"
    },
    {
      "cve": "CVE-2020-19190",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Buffer Overflow vulnerability in _nc_find_entry in tinfo/comp_hash.c:70 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19190"
    },
    {
      "cve": "CVE-2020-19909",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-19909"
    },
    {
      "cve": "CVE-2020-21047",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The libcpu component which is used by libasm of elfutils version 0.177 (git 47780c9e), suffers from denial-of-service vulnerability caused by application crashes due to out-of-bounds write (CWE-787), off-by-one error (CWE-193) and reachable assertion (CWE-617); to exploit the vulnerability, the attackers need to craft certain ELF files which bypass the missing bound checks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-21047"
    },
    {
      "cve": "CVE-2020-21913",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-21913"
    },
    {
      "cve": "CVE-2020-22218",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-22218"
    },
    {
      "cve": "CVE-2020-24659",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GnuTLS before 3.6.15. A server can trigger a NULL pointer dereference in a TLS 1.3 client if a no_renegotiation alert is sent with unexpected timing, and then an invalid second handshake occurs. The crash happens in the application\u0027s error handling path, where the gnutls_deinit function is called after detecting a handshake failure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-24659"
    },
    {
      "cve": "CVE-2020-24977",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-24977"
    },
    {
      "cve": "CVE-2020-25692",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference was found in OpenLDAP server and was fixed in openldap 2.4.55, during a request for renaming RDNs. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a Denial of Service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-25692"
    },
    {
      "cve": "CVE-2020-25709",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in OpenLDAP. This flaw allows an attacker who can send a malicious packet to be processed by OpenLDAP\u2019s slapd server, to trigger an assertion failure. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-25709"
    },
    {
      "cve": "CVE-2020-25710",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in OpenLDAP in versions before 2.4.56. This flaw allows an attacker who sends a malicious packet processed by OpenLDAP to force a failed assertion in csnNormalize23(). The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-25710"
    },
    {
      "cve": "CVE-2020-26116",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-26116"
    },
    {
      "cve": "CVE-2020-27618",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-27618"
    },
    {
      "cve": "CVE-2020-28196",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "MIT Kerberos 5 (aka krb5) before 1.17.2 and 1.18.x before 1.18.3 allows unbounded recursion via an ASN.1-encoded Kerberos message because the lib/krb5/asn.1/asn1_encode.c support for BER indefinite lengths lacks a recursion limit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-28196"
    },
    {
      "cve": "CVE-2020-29361",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-29361"
    },
    {
      "cve": "CVE-2020-29362",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-29362"
    },
    {
      "cve": "CVE-2020-29363",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-29363"
    },
    {
      "cve": "CVE-2020-29562",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-29562"
    },
    {
      "cve": "CVE-2020-29573",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-29573"
    },
    {
      "cve": "CVE-2020-35525",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQlite 3.31.1, a potential null pointer derreference was found in the INTERSEC query processing.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-35525"
    },
    {
      "cve": "CVE-2020-35527",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite 3.31.1, there is an out of bounds access problem through ALTER TABLE for views that have a nested FROM clause.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-35527"
    },
    {
      "cve": "CVE-2020-36221",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing, resulting in denial of service (schema_init.c serialNumberAndIssuerCheck).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36221"
    },
    {
      "cve": "CVE-2020-36222",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36222"
    },
    {
      "cve": "CVE-2020-36223",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling, resulting in denial of service (double free and out-of-bounds read).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36223"
    },
    {
      "cve": "CVE-2020-36224",
      "cwe": {
        "id": "CWE-763",
        "name": "Release of Invalid Pointer or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36224"
    },
    {
      "cve": "CVE-2020-36225",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36225"
    },
    {
      "cve": "CVE-2020-36226",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch-\u003ebv_len miscalculation and slapd crash in the saslAuthzTo processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36226"
    },
    {
      "cve": "CVE-2020-36227",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36227"
    },
    {
      "cve": "CVE-2020-36228",
      "cwe": {
        "id": "CWE-191",
        "name": "Integer Underflow (Wrap or Wraparound)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36228"
    },
    {
      "cve": "CVE-2020-36229",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36229"
    },
    {
      "cve": "CVE-2020-36230",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element, resulting in denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2020-36230"
    },
    {
      "cve": "CVE-2021-3177",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3177"
    },
    {
      "cve": "CVE-2021-3326",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3326"
    },
    {
      "cve": "CVE-2021-3426",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in Python 3\u0027s pydoc. A local or adjacent attacker who discovers or is able to convince another local or adjacent user to start a pydoc server could access the server and use it to disclose sensitive information belonging to the other user that they would not normally be able to access. The highest risk of this flaw is to data confidentiality. This flaw affects Python versions before 3.8.9, Python versions before 3.9.3 and Python versions before 3.10.0a7.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3426"
    },
    {
      "cve": "CVE-2021-3516",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in libxml2\u0027s xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3516"
    },
    {
      "cve": "CVE-2021-3517",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3517"
    },
    {
      "cve": "CVE-2021-3518",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3518"
    },
    {
      "cve": "CVE-2021-3520",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3520"
    },
    {
      "cve": "CVE-2021-3537",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3537"
    },
    {
      "cve": "CVE-2021-3541",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3541"
    },
    {
      "cve": "CVE-2021-3580",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the way nettle\u0027s RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3580"
    },
    {
      "cve": "CVE-2021-3733",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There\u0027s a flaw in urllib\u0027s AbstractBasicAuthHandler class. An attacker who controls a malicious HTTP server that an HTTP client (such as web browser) connects to, could trigger a Regular Expression Denial of Service (ReDOS) during an authentication request with a specially crafted payload that is sent by the server to the client. The greatest threat that this flaw poses is to application availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3733"
    },
    {
      "cve": "CVE-2021-3737",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in python. An improperly handled HTTP response in the HTTP client code of python may allow a remote attacker, who controls the HTTP server, to make the client script enter an infinite loop, consuming CPU time. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3737"
    },
    {
      "cve": "CVE-2021-3826",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3826"
    },
    {
      "cve": "CVE-2021-3997",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in systemd. An uncontrolled recursion in systemd-tmpfiles may lead to a denial of service at boot time when too many nested directories are created in /tmp.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3997"
    },
    {
      "cve": "CVE-2021-3998",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. The realpath() function can mistakenly return an unexpected value, potentially leading to information leakage and disclosure of sensitive data.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3998"
    },
    {
      "cve": "CVE-2021-3999",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-3999"
    },
    {
      "cve": "CVE-2021-4122",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "It was found that a specially crafted LUKS header could trick cryptsetup into disabling encryption during the recovery of the device. An attacker with physical access to the medium, such as a flash disk, could use this flaw to force a user into permanently disabling the encryption layer of that medium.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-4122"
    },
    {
      "cve": "CVE-2021-4189",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-4189"
    },
    {
      "cve": "CVE-2021-4209",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in GnuTLS. As Nettle\u0027s hash update functions internally call memcpy, providing zero-length input may cause undefined behavior. This flaw leads to a denial of service after authentication in rare circumstances.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-4209"
    },
    {
      "cve": "CVE-2021-20193",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the src/list.c of tar 1.33 and earlier. This flaw allows an attacker who can submit a crafted input file to tar to cause uncontrolled consumption of memory. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-20193"
    },
    {
      "cve": "CVE-2021-20227",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in SQLite\u0027s SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-20227"
    },
    {
      "cve": "CVE-2021-20231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-20231"
    },
    {
      "cve": "CVE-2021-20232",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-20232"
    },
    {
      "cve": "CVE-2021-20305",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Nettle in versions before 3.7.2, where several Nettle signature verification functions (GOST DSA, EDDSA \u0026 ECDSA) result in the Elliptic Curve Cryptography point (ECC) multiply function being called with out-of-range scalers, possibly resulting in incorrect results. This flaw allows an attacker to force an invalid signature, causing an assertion failure or possible validation. The highest threat to this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-20305"
    },
    {
      "cve": "CVE-2021-22876",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.1.1 to and including 7.75.0 is vulnerable to an \"Exposure of Private Personal Information to an Unauthorized Actor\" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22876"
    },
    {
      "cve": "CVE-2021-22890",
      "cwe": {
        "id": "CWE-290",
        "name": "Authentication Bypass by Spoofing"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly \"short-cut\" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22890"
    },
    {
      "cve": "CVE-2021-22897",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single \"static\" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22897"
    },
    {
      "cve": "CVE-2021-22898",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "**NOTE: CVE-2021-22898 is an incomplete fix (see https://hackerone.com/reports/1223882)! Check if affected products also have fixed CVE-22925 instead! Do not use CVE-2021-22898 in public advisories!**\r\n\r\ncurl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22898"
    },
    {
      "cve": "CVE-2021-22901",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22901"
    },
    {
      "cve": "CVE-2021-22922",
      "cwe": {
        "id": "CWE-354",
        "name": "Improper Validation of Integrity Check Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload, curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done, and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22922"
    },
    {
      "cve": "CVE-2021-22923",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user\u0027s expectations and intentions and without telling the user it happened.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22923"
    },
    {
      "cve": "CVE-2021-22924",
      "cwe": {
        "id": "CWE-706",
        "name": "Use of Incorrectly-Resolved Name or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function did not take \u0027issuercert\u0027 into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn\u0027t include the \u0027issuer cert\u0027 which a transfer can set to qualify how to verify the server certificate.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22924"
    },
    {
      "cve": "CVE-2021-22925",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl supports the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl. This rarely used option is used to send variable=content pairs to TELNET servers. Due to flaw in the option parser for sending `NEW_ENV` variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server. Therefore potentially revealing sensitive internal information to the server using a clear-text network protocol. This could happen because curl did not call and use sscanf() correctly when parsing the string provided by the application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22925"
    },
    {
      "cve": "CVE-2021-22926",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport, an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file, it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`), a malicious user can create a file name with the same name as the app wants to use by name, and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22926"
    },
    {
      "cve": "CVE-2021-22945",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When sending data to an MQTT server, libcurl \u003c= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22945"
    },
    {
      "cve": "CVE-2021-22946",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A user can tell curl \u003e= 7.20.0 and \u003c= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22946"
    },
    {
      "cve": "CVE-2021-22947",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003e= 7.20.0 and \u003c= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not flush the in-queue of cached responses but instead continue using and trustingthe responses it got *before* the TLS handshake as if they were authenticated.Using this flaw, it allows a Man-In-The-Middle attacker to first inject the fake responses, then pass-through the TLS traffic from the legitimate server and trick curl into sending data back to the user thinking the attacker\u0027s injected data comes from the TLS-protected server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-22947"
    },
    {
      "cve": "CVE-2021-23336",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The package python/cpython from 0 and before 3.6.13, from 3.7.0 and before 3.7.10, from 3.8.0 and before 3.8.8, from 3.9.0 and before 3.9.2 are vulnerable to Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:U/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-23336"
    },
    {
      "cve": "CVE-2021-27212",
      "cwe": {
        "id": "CWE-617",
        "name": "Reachable Assertion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenLDAP through 2.4.57 and 2.5.x through 2.5.1alpha, an assertion failure in slapd can occur in the issuerAndThisUpdateCheck function via a crafted packet, resulting in a denial of service (daemon exit) via a short timestamp. This is related to schema_init.c and checkTime.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-27212"
    },
    {
      "cve": "CVE-2021-27218",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-27218"
    },
    {
      "cve": "CVE-2021-27219",
      "cwe": {
        "id": "CWE-681",
        "name": "Incorrect Conversion between Numeric Types"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.6 and 2.67.x before 2.67.3. The function g_bytes_new has an integer overflow on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. The overflow could potentially lead to memory corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-27219"
    },
    {
      "cve": "CVE-2021-27645",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-27645"
    },
    {
      "cve": "CVE-2021-28041",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-28041"
    },
    {
      "cve": "CVE-2021-28153",
      "cwe": {
        "id": "CWE-59",
        "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-28153"
    },
    {
      "cve": "CVE-2021-28363",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in some cases involving HTTPS to HTTPS proxies. The initial connection to the HTTPS proxy (if an SSLContext isn\u0027t given via proxy_config) doesn\u0027t verify the hostname of the certificate. This means certificates for different servers that still validate properly with the default urllib3 SSLContext will be silently accepted.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-28363"
    },
    {
      "cve": "CVE-2021-28861",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states \"Warning: http.server is not recommended for production. It only implements basic security checks.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-28861"
    },
    {
      "cve": "CVE-2021-31239",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue found in SQLite SQLite3 v.3.35.4 that could allow a remote attacker to cause a denial of service via the appendvfs.c function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-31239"
    },
    {
      "cve": "CVE-2021-32292",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in json-c from 20200420 (post 0.14 unreleased code) through 0.15-20200726. A stack-buffer-overflow exists in the auxiliary sample program json_parse which is located in the function parseit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-32292"
    },
    {
      "cve": "CVE-2021-33294",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In elfutils 0.183, an infinite loop was found in the function handle_symtab in readelf.c .Which allows attackers to cause a denial of service (infinite loop) via crafted file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-33294"
    },
    {
      "cve": "CVE-2021-33560",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-33560"
    },
    {
      "cve": "CVE-2021-33574",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-33574"
    },
    {
      "cve": "CVE-2021-33910",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The use of alloca function with an uncontrolled size in function unit_name_path_escape allows a local attacker, able to mount a filesystem on a very long path, to crash systemd and the whole system by allocating a very large space in the stack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-33910"
    },
    {
      "cve": "CVE-2021-35942",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-35942"
    },
    {
      "cve": "CVE-2021-36084",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __cil_verify_classpermission and __cil_pre_verify_helper).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36084"
    },
    {
      "cve": "CVE-2021-36085",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in __cil_verify_classperms (called from __verify_map_perm_classperms and hashtab_map).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36085"
    },
    {
      "cve": "CVE-2021-36086",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a use-after-free in cil_reset_classpermission (called from cil_reset_classperms_set and cil_reset_classperms_list).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36086"
    },
    {
      "cve": "CVE-2021-36087",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The CIL compiler in SELinux 3.2 has a heap-based buffer over-read in ebitmap_match_any (called indirectly from cil_check_neverallow). This occurs because there is sometimes a lack of checks for invalid statements in an optional block.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36087"
    },
    {
      "cve": "CVE-2021-36222",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36222"
    },
    {
      "cve": "CVE-2021-36690",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-36690"
    },
    {
      "cve": "CVE-2021-37600",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-37600"
    },
    {
      "cve": "CVE-2021-37750",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-37750"
    },
    {
      "cve": "CVE-2021-38604",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In librt in the GNU C Library (aka glibc) through 2.34, sysdeps/unix/sysv/linux/mq_notify.c mishandles certain NOTIFY_REMOVED data, leading to a NULL pointer dereference. NOTE: this vulnerability was introduced as a side effect of the CVE-2021-33574 fix.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-38604"
    },
    {
      "cve": "CVE-2021-43396",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "** DISPUTED ** In iconvdata/iso-2022-jp-3.c in the GNU C Library (aka glibc) 2.34, remote attackers can force iconv() to emit a spurious \u0027\\0\u0027 character via crafted ISO-2022-JP-3 data that is accompanied by an internal state reset. This may affect data integrity in certain iconv() use cases. NOTE: the vendor states \"the bug cannot be invoked through user input and requires iconv to be invoked with a NULL inbuf, which ought to require a separate application bug to do so unintentionally. Hence there\u0027s no security impact to the bug.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-43396"
    },
    {
      "cve": "CVE-2021-43618",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-43618"
    },
    {
      "cve": "CVE-2021-44879",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In gc_data_segment in fs/f2fs/gc.c in the Linux kernel before 5.16.3, special files are not considered, leading to a move_data_page NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-44879"
    },
    {
      "cve": "CVE-2021-45960",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-45960"
    },
    {
      "cve": "CVE-2021-46143",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-46143"
    },
    {
      "cve": "CVE-2021-46195",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-46195"
    },
    {
      "cve": "CVE-2021-46828",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-46828"
    },
    {
      "cve": "CVE-2021-46848",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2021-46848"
    },
    {
      "cve": "CVE-2022-0391",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like \u0027\\r\u0027 and \u0027\\n\u0027 in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-0391"
    },
    {
      "cve": "CVE-2022-0563",
      "cwe": {
        "id": "CWE-209",
        "name": "Generation of Error Message Containing Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an \"INPUTRC\" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-0563"
    },
    {
      "cve": "CVE-2022-0778",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The BN_mod_sqrt() function in openSSL, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-0778"
    },
    {
      "cve": "CVE-2022-1271",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An arbitrary file write vulnerability was found in GNU gzip\u0027s zgrep utility. When zgrep is applied on the attacker\u0027s chosen file name (for example, a crafted file name), this can overwrite an attacker\u0027s content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1271"
    },
    {
      "cve": "CVE-2022-1292",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The c_rehash script does not properly sanitise shell metacharacters to prevent command injection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1292"
    },
    {
      "cve": "CVE-2022-1304",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1304"
    },
    {
      "cve": "CVE-2022-1343",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under certain circumstances, the command line OCSP verify function reports successful verification when the verification in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1343"
    },
    {
      "cve": "CVE-2022-1434",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When using the RC4-MD5 ciphersuite, which is disabled by default, an attacker is able to modify data in transit due to an incorrect use of the AAD data as the MAC key in OpenSSL 3.0. An attacker is not able to decrypt any communication.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1434"
    },
    {
      "cve": "CVE-2022-1473",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The used OpenSSL version improperly reuses memory when decoding certificates or keys. This can lead to a process termination and Denial of Service for long lived processes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-1473"
    },
    {
      "cve": "CVE-2022-2068",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-2097",
      "cwe": {
        "id": "CWE-326",
        "name": "Inadequate Encryption Strength"
      },
      "notes": [
        {
          "category": "summary",
          "text": "AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn\u0027t written. In the special case of \"in place\" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-2097"
    },
    {
      "cve": "CVE-2022-2274",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corruption an attacker may be able to trigger a remote code execution on the machine performing the computation. SSL/TLS servers or other servers using 2048 bit RSA private keys running on machines supporting AVX512IFMA instructions of the X86_64 architecture are affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-2274"
    },
    {
      "cve": "CVE-2022-2509",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-2509"
    },
    {
      "cve": "CVE-2022-3715",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-3715"
    },
    {
      "cve": "CVE-2022-3821",
      "cwe": {
        "id": "CWE-193",
        "name": "Off-by-one Error"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-3821"
    },
    {
      "cve": "CVE-2022-4304",
      "cwe": {
        "id": "CWE-326",
        "name": "Inadequate Encryption Strength"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Disable the use of RSA ciphers in the web server configuration; note that RSA ciphers are disabled by default",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-4304"
    },
    {
      "cve": "CVE-2022-4450",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Do not import or configure certificate files in PEM format from untrusted sources",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-4450"
    },
    {
      "cve": "CVE-2022-22576",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22576"
    },
    {
      "cve": "CVE-2022-22822",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "addBinding in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22822"
    },
    {
      "cve": "CVE-2022-22823",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "build_model in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22823"
    },
    {
      "cve": "CVE-2022-22824",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "defineAttribute in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22824"
    },
    {
      "cve": "CVE-2022-22825",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "lookup in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22825"
    },
    {
      "cve": "CVE-2022-22826",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22826"
    },
    {
      "cve": "CVE-2022-22827",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "storeAtts in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-22827"
    },
    {
      "cve": "CVE-2022-23218",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-23218"
    },
    {
      "cve": "CVE-2022-23219",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-23219"
    },
    {
      "cve": "CVE-2022-23308",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-23308"
    },
    {
      "cve": "CVE-2022-23852",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Expat (aka libexpat) before 2.4.4 has a signed integer overflow in XML_GetBuffer, for configurations with a nonzero XML_CONTEXT_BYTES.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-23852"
    },
    {
      "cve": "CVE-2022-23990",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Expat (aka libexpat) before 2.4.4 has an integer overflow in the doProlog function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-23990"
    },
    {
      "cve": "CVE-2022-24407",
      "cwe": {
        "id": "CWE-89",
        "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-24407"
    },
    {
      "cve": "CVE-2022-25235",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-25235"
    },
    {
      "cve": "CVE-2022-25236",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "summary",
          "text": "xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-25236"
    },
    {
      "cve": "CVE-2022-25313",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-25313"
    },
    {
      "cve": "CVE-2022-25314",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-25314"
    },
    {
      "cve": "CVE-2022-25315",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-25315"
    },
    {
      "cve": "CVE-2022-26488",
      "cwe": {
        "id": "CWE-426",
        "name": "Untrusted Search Path"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Python before 3.10.3 on Windows, local users can gain privileges because the search path is inadequately secured. The installer may allow a local attacker to add user-writable directories to the system search path. To exploit, an administrator must have installed Python for all users and enabled PATH entries. A non-administrative user can trigger a repair that incorrectly adds user-writable paths into PATH, enabling search-path hijacking of other users and system services. This affects Python (CPython) through 3.7.12, 3.8.x through 3.8.12, 3.9.x through 3.9.10, and 3.10.x through 3.10.2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-26488"
    },
    {
      "cve": "CVE-2022-27774",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27774"
    },
    {
      "cve": "CVE-2022-27775",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27775"
    },
    {
      "cve": "CVE-2022-27776",
      "cwe": {
        "id": "CWE-522",
        "name": "Insufficiently Protected Credentials"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27776"
    },
    {
      "cve": "CVE-2022-27778",
      "cwe": {
        "id": "CWE-706",
        "name": "Use of Incorrectly-Resolved Name or Reference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when `--no-clobber` is used together with `--remove-on-error`.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27778"
    },
    {
      "cve": "CVE-2022-27779",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl\u0027s \"cookie engine\" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27779"
    },
    {
      "cve": "CVE-2022-27780",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The curl URL parser wrongly accepts percent-encoded URL separators like \u0027/\u0027when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like `http://example.com%2F127.0.0.1/`, would be allowed bythe parser and get transposed into `http://example.com/127.0.0.1/`. This flawcan be used to circumvent filters, checks and more.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27780"
    },
    {
      "cve": "CVE-2022-27781",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl provides the `CURLOPT_CERTINFO` option to allow applications torequest details to be returned about a server\u0027s certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27781"
    },
    {
      "cve": "CVE-2022-27782",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27782"
    },
    {
      "cve": "CVE-2022-27943",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-27943"
    },
    {
      "cve": "CVE-2022-28321",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn\u0027t correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-28321"
    },
    {
      "cve": "CVE-2022-29155",
      "cwe": {
        "id": "CWE-89",
        "name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2, a SQL injection vulnerability exists in the experimental back-sql backend to slapd, via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed, due to a lack of proper escaping.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-29155"
    },
    {
      "cve": "CVE-2022-29824",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don\u0027t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2\u0027s buffer functions, for example libxslt through 1.1.35, is affected as well.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-29824"
    },
    {
      "cve": "CVE-2022-30115",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-30115"
    },
    {
      "cve": "CVE-2022-32205",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A malicious server can serve excessive amounts of \"Set-Cookie:\" headers in a HTTP response to curl and curl \u003c 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven\u0027t expired. Due to cookie matching rules, a server on \"foo.example.com\" can set cookies that also would match for \"bar.example.com\", making it it possible for a \"sister server\" to effectively cause a denial of service for a sibling site on the same second level domain using this method.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-32205"
    },
    {
      "cve": "CVE-2022-32206",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl \u003c 7.84.0 supports \"chained\" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a \"malloc bomb\", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-32206"
    },
    {
      "cve": "CVE-2022-32207",
      "cwe": {
        "id": "CWE-276",
        "name": "Incorrect Default Permissions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-32207"
    },
    {
      "cve": "CVE-2022-32208",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl \u003c 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-32208"
    },
    {
      "cve": "CVE-2022-32221",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-32221"
    },
    {
      "cve": "CVE-2022-35252",
      "cwe": {
        "id": "CWE-1286",
        "name": "Improper Validation of Syntactic Correctness of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a\"sister site\" to deny service to all siblings.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-35252"
    },
    {
      "cve": "CVE-2022-35260",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-35260"
    },
    {
      "cve": "CVE-2022-35737",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-35737"
    },
    {
      "cve": "CVE-2022-37434",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-37434"
    },
    {
      "cve": "CVE-2022-37454",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-37454"
    },
    {
      "cve": "CVE-2022-40303",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-40303"
    },
    {
      "cve": "CVE-2022-40304",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-40304"
    },
    {
      "cve": "CVE-2022-40674",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-40674"
    },
    {
      "cve": "CVE-2022-42898",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-42898"
    },
    {
      "cve": "CVE-2022-42915",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl before 7.86.0 has a double free. If curl is told to use an HTTP proxy for a transfer with a non-HTTP(S) URL, it sets up the connection to the remote server by issuing a CONNECT request to the proxy, and then tunnels the rest of the protocol through. An HTTP proxy might refuse this request (HTTP proxies often only allow outgoing connections to specific port numbers, like 443 for HTTPS) and instead return a non-200 status code to the client. Due to flaws in the error/cleanup handling, this could trigger a double free in curl if one of the following schemes were used in the URL for the transfer: dict, gopher, gophers, ldap, ldaps, rtmp, rtmps, or telnet. The earliest affected version is 7.77.0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-42915"
    },
    {
      "cve": "CVE-2022-42916",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using its HSTS support, curl can be instructed to use HTTPS directly (instead of using an insecure cleartext HTTP step) even when HTTP is provided in the URL. This mechanism could be bypassed if the host name in the given URL uses IDN characters that get replaced with ASCII counterparts as part of the IDN conversion, e.g., using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop of U+002E (.). The earliest affected version is 7.77.0 2021-05-26.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-42916"
    },
    {
      "cve": "CVE-2022-43551",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability exists in curl \u003c7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop U+002E (.). Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-43551"
    },
    {
      "cve": "CVE-2022-43552",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "curl can be asked to tunnel virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations using an appropriate HTTP error response code. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-43552"
    },
    {
      "cve": "CVE-2022-43680",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-43680"
    },
    {
      "cve": "CVE-2022-45061",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-45061"
    },
    {
      "cve": "CVE-2022-45873",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-45873"
    },
    {
      "cve": "CVE-2022-46908",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "SQLite through 3.40.0, when relying on --safe for execution of an untrusted CLI script, does not properly implement the azProhibitedFunctions protection mechanism, and instead allows UDF functions such as WRITEFILE.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-46908"
    },
    {
      "cve": "CVE-2022-48303",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-48303"
    },
    {
      "cve": "CVE-2022-48522",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Perl 5.34.0, function S_find_uninit_var in sv.c has a stack-based crash that can lead to remote code execution or local privilege escalation.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-48522"
    },
    {
      "cve": "CVE-2022-48560",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free exists in Python through 3.9 via heappushpop in heapq.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2022-48560"
    },
    {
      "cve": "CVE-2023-0215",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0215"
    },
    {
      "cve": "CVE-2023-0286",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Disable CRL (certification revocation list) checking, if possible",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0286"
    },
    {
      "cve": "CVE-2023-0361",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0361"
    },
    {
      "cve": "CVE-2023-0464",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing the `-policy` argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()` function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0464"
    },
    {
      "cve": "CVE-2023-0465",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Applications that use a non-default option when verifying certificates may be\r\nvulnerable to an attack from a malicious CA to circumvent certain checks.\r\n\r\nInvalid certificate policies in leaf certificates are silently ignored by\r\nOpenSSL and other certificate policy checks are skipped for that certificate.\r\nA malicious CA could use this to deliberately assert invalid certificate policies\r\nin order to circumvent policy checking on the certificate altogether.\r\n\r\nPolicy processing is disabled by default but can be enabled by passing\r\nthe `-policy` argument to the command line utilities or by calling the\r\n`X509_VERIFY_PARAM_set1_policies()` function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0465"
    },
    {
      "cve": "CVE-2023-0466",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The function X509_VERIFY_PARAM_add0_policy() is documented to\r\nimplicitly enable the certificate policy check when doing certificate\r\nverification. However the implementation of the function does not\r\nenable the check which allows certificates with invalid or incorrect\r\npolicies to pass the certificate verification.\r\n\r\nAs suddenly enabling the policy check could break existing deployments it was\r\ndecided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()\r\nfunction.\r\n\r\nInstead the applications that require OpenSSL to perform certificate\r\npolicy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly\r\nenable the policy check by calling X509_VERIFY_PARAM_set_flags() with\r\nthe X509_V_FLAG_POLICY_CHECK flag argument.\r\n\r\nCertificate policy checks are disabled by default in OpenSSL and are not\r\ncommonly used by applications.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0466"
    },
    {
      "cve": "CVE-2023-0687",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It\u0027s basically trusted input or input that needs an actual security flaw to be compromised or controlled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-0687"
    },
    {
      "cve": "CVE-2023-1077",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-1077"
    },
    {
      "cve": "CVE-2023-1206",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel\u2019s IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-1206"
    },
    {
      "cve": "CVE-2023-2650",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(square(n)) with \u0027n\u0027 being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer\u0027s certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-2650"
    },
    {
      "cve": "CVE-2023-2953",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3212",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3212"
    },
    {
      "cve": "CVE-2023-3446",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. One of those checks confirms that the modulus (\u0027p\u0027 parameter) is not too large. Trying to use a very large modulus is slow and OpenSSL will not normally use a modulus which is over 10,000 bits in length. However the DH_check() function checks numerous aspects of the key or parameters that have been supplied. Some of those checks use the supplied modulus value even if it has already been found to be too large. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulernable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \u0027-check\u0027 option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3446"
    },
    {
      "cve": "CVE-2023-3609",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: cls_u32 component can be exploited to achieve local privilege escalation.\r\n\r\nIf tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3609"
    },
    {
      "cve": "CVE-2023-3611",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds write vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\r\n\r\nThe qfq_change_agg() function in net/sched/sch_qfq.c allows an out-of-bounds write because lmax is updated according to packet sizes without bounds checks.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3611"
    },
    {
      "cve": "CVE-2023-3772",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Linux kernel\u0027s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3772"
    },
    {
      "cve": "CVE-2023-3817",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the \"-check\" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-3817"
    },
    {
      "cve": "CVE-2023-4016",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Under some circumstances, this weakness allows a user who has access to run the \u201cps\u201d utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4016"
    },
    {
      "cve": "CVE-2023-4039",
      "cwe": {
        "id": "CWE-693",
        "name": "Protection Mechanism Failure"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A failure in the -fstack-protector feature in GCC-based toolchains \nthat target AArch64 allows an attacker to exploit an existing buffer \noverflow in dynamically-sized local variables in your application \nwithout this being detected. This stack-protector failure only applies \nto C99-style dynamically-sized local variables or those created using \nalloca(). The stack-protector operates as intended for statically-sized \nlocal variables.\n\nThe default behavior when the stack-protector \ndetects an overflow is to terminate your application, resulting in \ncontrolled loss of availability. An attacker who can exploit a buffer \noverflow without triggering the stack-protector might be able to change \nprogram flow control to cause an uncontrolled loss of availability or to\n go further and affect confidentiality or integrity.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4039"
    },
    {
      "cve": "CVE-2023-4623",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4623"
    },
    {
      "cve": "CVE-2023-4807",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4807"
    },
    {
      "cve": "CVE-2023-4813",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4813"
    },
    {
      "cve": "CVE-2023-4921",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_qfq component can be exploited to achieve local privilege escalation.\n\nWhen the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue().\n\nWe recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-4921"
    },
    {
      "cve": "CVE-2023-5156",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5156"
    },
    {
      "cve": "CVE-2023-5678",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn\u0027t make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn\u0027t check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the \"-pubcheck\" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5678"
    },
    {
      "cve": "CVE-2023-5717",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.\r\n\r\nIf perf_read_group() is called while an event\u0027s sibling_list is smaller than its child\u0027s sibling_list, it can increment or write to memory locations outside of the allocated buffer.\r\n\r\nWe recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5717"
    },
    {
      "cve": "CVE-2023-5981",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-5981"
    },
    {
      "cve": "CVE-2023-6121",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6121"
    },
    {
      "cve": "CVE-2023-6817",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nThe function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.\n\nWe recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6817"
    },
    {
      "cve": "CVE-2023-6931",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A heap out-of-bounds write vulnerability in the Linux kernel\u0027s Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event\u0027s read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6931"
    },
    {
      "cve": "CVE-2023-6932",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free vulnerability in the Linux kernel\u0027s ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-6932"
    },
    {
      "cve": "CVE-2023-23914",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support, curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-23914"
    },
    {
      "cve": "CVE-2023-23915",
      "cwe": {
        "id": "CWE-319",
        "name": "Cleartext Transmission of Sensitive Information"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A cleartext transmission of sensitive information vulnerability exists in curl \u003cv7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "For earlier versions see the recommendations from section Workarounds and Mitigations",
          "product_ids": [
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-23915"
    },
    {
      "cve": "CVE-2023-23916",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An allocation of resources without limits or throttling vulnerability exists in curl \u003cv7.88.0 based on the \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable \"links\" in this \"decompression chain\" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a \"malloc bomb\", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-23916"
    },
    {
      "cve": "CVE-2023-24329",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-24329"
    },
    {
      "cve": "CVE-2023-25136",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states \"remote code execution is theoretically possible.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-25136"
    },
    {
      "cve": "CVE-2023-25139",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-25139"
    },
    {
      "cve": "CVE-2023-26604",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "systemd before 247 does not adequately block local privilege escalation for some Sudo configurations, e.g., plausible sudoers files in which the \"systemctl status\" command may be executed. Specifically, systemd does not set LESSSECURE to 1, and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo, because less executes as root when the terminal size is too small to show the complete systemctl output.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-26604"
    },
    {
      "cve": "CVE-2023-27371",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more \u0027\\0\u0027 bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27371"
    },
    {
      "cve": "CVE-2023-27533",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability in input validation exists in curl \u003c8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and \"telnet options\" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application\u0027s intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27533"
    },
    {
      "cve": "CVE-2023-27534",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A path traversal vulnerability exists in curl \u003c8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user\u0027s home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27534"
    },
    {
      "cve": "CVE-2023-27535",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An authentication bypass vulnerability exists in libcurl \u003c8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27535"
    },
    {
      "cve": "CVE-2023-27536",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An authentication bypass vulnerability exists libcurl \u003c8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27536"
    },
    {
      "cve": "CVE-2023-27537",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A double free vulnerability exists in libcurl \u003c8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27537"
    },
    {
      "cve": "CVE-2023-27538",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse. libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-27538"
    },
    {
      "cve": "CVE-2023-28484",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-28484"
    },
    {
      "cve": "CVE-2023-29383",
      "cwe": {
        "id": "CWE-74",
        "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \\n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \\r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that \"cat /etc/passwd\" shows a rogue user account.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-29383"
    },
    {
      "cve": "CVE-2023-29469",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the \u0027\\0\u0027 value).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-29469"
    },
    {
      "cve": "CVE-2023-29491",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-29491"
    },
    {
      "cve": "CVE-2023-29499",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-29499"
    },
    {
      "cve": "CVE-2023-31085",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in drivers/mtd/ubi/cdev.c in the Linux kernel 6.2. There is a divide-by-zero error in do_div(sz,mtd-\u003eerasesize), used indirectly by ctrl_cdev_ioctl, when mtd-\u003eerasesize is 0.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-31085"
    },
    {
      "cve": "CVE-2023-32611",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-32611"
    },
    {
      "cve": "CVE-2023-32636",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-32636"
    },
    {
      "cve": "CVE-2023-32643",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-32643"
    },
    {
      "cve": "CVE-2023-32665",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "mitigation",
          "details": "Limit remote access to port 22350/tcp on systems where the Codemeter runtime network server is running. Note that this is the default configuration, which therefore limits the exploitability to local attacks only.",
          "product_ids": [
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-32665"
    },
    {
      "cve": "CVE-2023-34319",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The fix for XSA-423 added logic to Linux\u0027es netback driver to deal with\na frontend splitting a packet in a way such that not all of the headers\nwould come in one piece.  Unfortunately the logic introduced there\ndidn\u0027t account for the extreme case of the entire packet being split\ninto as many pieces as permitted by the protocol, yet still being\nsmaller than the area that\u0027s specially dealt with to keep all (possible)\nheaders together.  Such an unusual packet would therefore trigger a\nbuffer overrun in the driver.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-34319"
    },
    {
      "cve": "CVE-2023-34969",
      "cwe": {
        "id": "CWE-311",
        "name": "Missing Encryption of Sensitive Data"
      },
      "notes": [
        {
          "category": "summary",
          "text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-34969"
    },
    {
      "cve": "CVE-2023-35001",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-35001"
    },
    {
      "cve": "CVE-2023-35945",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy\u2019s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving `RST_STREAM` immediately followed by the `GOAWAY` frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the `GOAWAY` frame skips de-allocation of the bookkeeping structure and pending compressed header. The error return [code path] is taken if connection is already marked for not sending more requests due to `GOAWAY` frame. The clean-up code is right after the return statement, causing memory leak. Denial of service through memory exhaustion. This vulnerability was patched in versions(s) 1.26.3, 1.25.8, 1.24.9, 1.23.11.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-35945"
    },
    {
      "cve": "CVE-2023-38408",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-39128",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a stack overflow via the function ada_decode at /gdb/ada-lang.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39128"
    },
    {
      "cve": "CVE-2023-39189",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39189"
    },
    {
      "cve": "CVE-2023-39192",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39192"
    },
    {
      "cve": "CVE-2023-39193",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39193"
    },
    {
      "cve": "CVE-2023-39194",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.2,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39194"
    },
    {
      "cve": "CVE-2023-39615",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor\u0027s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-39615"
    },
    {
      "cve": "CVE-2023-40283",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-40283"
    },
    {
      "cve": "CVE-2023-42754",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-42754"
    },
    {
      "cve": "CVE-2023-42755",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the IPv4 Resource Reservation Protocol (RSVP) classifier in the Linux kernel. The xprt pointer may go beyond the linear part of the skb, leading to an out-of-bounds read in the `rsvp_classify` function. This issue may allow a local user to crash the system and cause a denial of service.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-42755"
    },
    {
      "cve": "CVE-2023-45322",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor\u0027s position is \"I don\u0027t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can\u0027t control when memory allocations fail.\"",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-45322"
    },
    {
      "cve": "CVE-2023-45853",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-45853"
    },
    {
      "cve": "CVE-2023-45871",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-45871"
    },
    {
      "cve": "CVE-2023-45898",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c, related to ext4_es_insert_extent.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-45898"
    },
    {
      "cve": "CVE-2023-45918",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ncurses 6.4-20230610 has a NULL pointer dereference in tgetstr in tinfo/lib_termcap.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-45918"
    },
    {
      "cve": "CVE-2023-46862",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-46862"
    },
    {
      "cve": "CVE-2023-52425",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52425"
    },
    {
      "cve": "CVE-2023-52426",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52426"
    },
    {
      "cve": "CVE-2023-52444",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid dirent corruption As Al reported in link[1]: f2fs_rename() ... if (old_dir != new_dir \u0026\u0026 !whiteout) f2fs_set_link(old_inode, old_dir_entry, old_dir_page, new_dir); else f2fs_put_page(old_dir_page, 0); You want correct inumber in the \"..\" link. And cross-directory rename does move the source to new parent, even if you\u0027d been asked to leave a whiteout in the old place. [1] https://lore.kernel.org/all/20231017055040.GN800259@ZenIV/ With below testcase, it may cause dirent corruption, due to it missed to call f2fs_set_link() to update \"..\" link to new directory. - mkdir -p dir/foo - renameat2 -w dir/foo bar [ASSERT] (__chk_dots_dentries:1421) --\u003e Bad inode number[0x4] for \u0027..\u0027, parent parent ino is [0x3] [FSCK] other corrupted bugs [Fail]",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52444"
    },
    {
      "cve": "CVE-2023-52464",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: EDAC/thunderx: Fix possible out-of-bounds string access Enabling -Wstringop-overflow globally exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function \u0027thunderx_ocx_com_threaded_isr\u0027: drivers/edac/thunderx_edac.c:1136:17: error: \u0027strncat\u0027 specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ... 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); ... 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); ... Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to strlcat(). [ bp: Trim compiler output, fixup commit message. ]",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52464"
    },
    {
      "cve": "CVE-2023-52612",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: crypto: scomp - fix req-\u003edst buffer overflow The req-\u003edst buffer size should be checked before copying from the scomp_scratch-\u003edst to avoid req-\u003edst buffer overflow problem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52612"
    },
    {
      "cve": "CVE-2023-52622",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid online resizing failures due to oversized flex bg.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52622"
    },
    {
      "cve": "CVE-2023-52675",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52675"
    },
    {
      "cve": "CVE-2023-52699",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sysv: don\u0027t call sb_bread() with pointers_lock held syzbot is reporting sleep in atomic context in SysV filesystem [1], for sb_bread() is called with rw_spinlock held. A \"write_lock(\u0026pointers_lock) =\u003e read_lock(\u0026pointers_lock) deadlock\" bug and a \"sb_bread() with write_lock(\u0026pointers_lock)\" bug were introduced by \"Replace BKL for chain locking with sysvfs-private rwlock\" in Linux 2.5.12. Then, \"[PATCH] err1-40: sysvfs locking fix\" in Linux 2.6.8 fixed the former bug by moving pointers_lock lock to the callers, but instead introduced a \"sb_bread() with read_lock(\u0026pointers_lock)\" bug (which made this problem easier to hit). Al Viro suggested that why not to do like get_branch()/get_block()/ find_shared() in Minix filesystem does. And doing like that is almost a revert of \"[PATCH] err1-40: sysvfs locking fix\" except that get_branch() from with find_shared() is called without write_lock(\u0026pointers_lock).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2023-52699"
    },
    {
      "cve": "CVE-2024-0584",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A use-after-free issue was found in igmp_start_timer in net/ipv4/igmp.c in the network sub-component in the Linux Kernel. This flaw allows a local user to observe a refcnt use-after-free issue when receiving an igmp query packet, leading to a kernel information leak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-0584"
    },
    {
      "cve": "CVE-2024-2004",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled.      curl --proto -all,-http http://curl.se  The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2004"
    },
    {
      "cve": "CVE-2024-2236",
      "cwe": {
        "id": "CWE-208",
        "name": "Observable Timing Discrepancy"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A timing-based side-channel flaw was found in libgcrypt\u0027s RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2236"
    },
    {
      "cve": "CVE-2024-2379",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2379"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-2466",
      "cwe": {
        "id": "CWE-297",
        "name": "Improper Validation of Certificate with Host Mismatch"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl did not check the server certificate of TLS connections done to a host specified as an IP address, when built to use mbedTLS.  libcurl would wrongly avoid using the set hostname function when the specified hostname was given as an IP address, therefore completely skipping the certificate check. This affects all uses of TLS protocols (HTTPS, FTPS, IMAPS, POPS3, SMTPS, etc).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2466"
    },
    {
      "cve": "CVE-2024-2511",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions. An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-2511"
    },
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application. The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists). This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a \"no overlap\" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem. In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur. This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue. Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-5535"
    },
    {
      "cve": "CVE-2024-5742",
      "cwe": {
        "id": "CWE-377",
        "name": "Insecure Temporary File"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-5742"
    },
    {
      "cve": "CVE-2024-6409",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A race condition vulnerability was discovered in how signals are handled by OpenSSH\u0027s server (sshd). If a remote attacker does not authenticate within a set time period, then sshd\u0027s SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-6409"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-8096",
      "cwe": {
        "id": "CWE-295",
        "name": "Improper Certificate Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When curl is told to use the Certificate Status Request TLS extension, often referred to as OCSP stapling, to verify that the server certificate is valid, it might fail to detect some OCSP problems and instead wrongly consider the response as fine. If the returned status reports another error than \u0027revoked\u0027 (like for example \u0027unauthorized\u0027) it is not treated as a bad certficate.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-8096"
    },
    {
      "cve": "CVE-2024-8176",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-8176"
    },
    {
      "cve": "CVE-2024-9143",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "Issue summary: Use of the low-level GF(2m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or even a possibility of a remote code execution, however, in all the protocols involving Elliptic Curve Cryptography that we\u0027re aware of, either only \"named curves\" are supported, or, if explicit curve parameters are supported, they specify an X9.62 encoding of binary (GF(2m)) curves that can\u0027t represent problematic input values. Thus the likelihood of existence of a vulnerable application is low. In particular, the X9.62 encoding is used for ECC keys in X.509 certificates, so problematic inputs cannot occur in the context of processing X.509 certificates. Any problematic use-cases would have to be using an \"exotic\" curve encoding. The affected APIs include: EC_GROUP_new_curve_GF2m(), EC_GROUP_new_from_params(), and various supporting BN_GF2m_*() functions. Applications working with \"exotic\" explicit binary (GF(2m)) curve parameters, that make it possible to represent invalid field polynomials with a zero constant term, via the above or similar APIs, may terminate abruptly as a result of reading or writing outside of array bounds. Remote code execution cannot easily be ruled out. The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-9143"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-11053"
    },
    {
      "cve": "CVE-2024-26645",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tracing: Ensure visibility when inserting an element into tracing_map.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26645"
    },
    {
      "cve": "CVE-2024-26671",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix IO hang from sbitmap wakeup race.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26671"
    },
    {
      "cve": "CVE-2024-26679",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ninet: read sk-\u003esk_family once in inet_recv_error()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26679"
    },
    {
      "cve": "CVE-2024-26772",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\next4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()\r\n\r\nPlaces the logic for checking if the group\u0027s block bitmap is corrupt under\r\nthe protection of the group lock to avoid allocating blocks from the group\r\nwith a corrupted block bitmap.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26772"
    },
    {
      "cve": "CVE-2024-26773",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26773"
    },
    {
      "cve": "CVE-2024-26777",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nfbdev: sis: Error out if pixclock equals zero",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26777"
    },
    {
      "cve": "CVE-2024-26805",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netlink: Fix kernel-infoleak-after-free in skb_datagram_iter.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26805"
    },
    {
      "cve": "CVE-2024-26835",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\nnetfilter: nf_tables: set dormant flag on hook register failure",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26835"
    },
    {
      "cve": "CVE-2024-26863",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access in hsr_get_node().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26863"
    },
    {
      "cve": "CVE-2024-26878",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: quota: Fix potential NULL pointer dereference.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26878"
    },
    {
      "cve": "CVE-2024-26880",
      "cwe": {
        "id": "CWE-99",
        "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: dm: call the resume method on internal suspend.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26880"
    },
    {
      "cve": "CVE-2024-26898",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26898"
    },
    {
      "cve": "CVE-2024-26901",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26901"
    },
    {
      "cve": "CVE-2024-26923",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26923"
    },
    {
      "cve": "CVE-2024-26957",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: s390/zcrypt: fix reference counting on zcrypt card objects.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26957"
    },
    {
      "cve": "CVE-2024-26973",
      "cwe": {
        "id": "CWE-457",
        "name": "Use of Uninitialized Variable"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: fat: fix uninitialized field in nostale filehandles When fat_encode_fh_nostale() encodes file handle without a parent it stores only first 10 bytes of the file handle. However the length of the file handle must be a multiple of 4 so the file handle is actually 12 bytes long and the last two bytes remain uninitialized. This is not great at we potentially leak uninitialized information with the handle to userspace. Properly initialize the full handle length.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-26973"
    },
    {
      "cve": "CVE-2024-27020",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix potential data-race in nft_expr_type_get().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-27020"
    },
    {
      "cve": "CVE-2024-27032",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid potential panic during recovery During recovery, if FAULT_BLOCK is on, it is possible that f2fs_reserve_new_block() will return -ENOSPC during recovery, then it may trigger panic. Also, if fault injection rate is 1 and only FAULT_BLOCK fault type is on, it may encounter deadloop in loop of block reservation. Let\u0027s change as below to fix these issues: - remove bug_on() to avoid panic. - limit the loop count of block reservation to avoid potential deadloop.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-27032"
    },
    {
      "cve": "CVE-2024-27065",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not compare internal table flags on updates Restore skipping transaction if table update does not modify flags.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-27065"
    },
    {
      "cve": "CVE-2024-27074",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: go7007: fix a memleak in go7007_load_encoder.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-27074"
    },
    {
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28757",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28757"
    },
    {
      "cve": "CVE-2024-28834",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28834"
    },
    {
      "cve": "CVE-2024-28835",
      "cwe": {
        "id": "CWE-248",
        "name": "Uncaught Exception"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the \"certtool --verify-chain\" command.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-28835"
    },
    {
      "cve": "CVE-2024-33621",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipvlan: Dont Use skb-\u003esk in ipvlan_process_v4 / 6_outbound.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-33621"
    },
    {
      "cve": "CVE-2024-34459",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-34459"
    },
    {
      "cve": "CVE-2024-35807",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix corruption during on-line resize.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35807"
    },
    {
      "cve": "CVE-2024-35809",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: PCI/PM: Drain runtime-idle callbacks before driver removal.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35809"
    },
    {
      "cve": "CVE-2024-35830",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: tc358743: register v4l2 async device only after successful setup Ensure the device has been setup correctly before registering the v4l2 async device, thus allowing userspace to access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35830"
    },
    {
      "cve": "CVE-2024-35888",
      "cwe": {
        "id": "CWE-457",
        "name": "Use of Uninitialized Variable"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: erspan: make sure erspan_base_hdr is present in skb-\u003ehead.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35888"
    },
    {
      "cve": "CVE-2024-35910",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: properly terminate timers for kernel sockets We had various syzbot reports about tcp timers firing after the corresponding netns has been dismantled. Fortunately Josef Bacik could trigger the issue more often, and could test a patch I wrote two years ago. When TCP sockets are closed, we call inet_csk_clear_xmit_timers() to \u0027stop\u0027 the timers. inet_csk_clear_xmit_timers() can be called from any context, including when socket lock is held. This is the reason it uses sk_stop_timer(), aka del_timer(). This means that ongoing timers might finish much later. For user sockets, this is fine because each running timer holds a reference on the socket, and the user socket holds a reference on the netns. For kernel sockets, we risk that the netns is freed before timer can complete, because kernel sockets do not hold reference on the netns. This patch adds inet_csk_clear_xmit_timers_sync() function that using sk_stop_timer_sync() to make sure all timers are terminated before the kernel socket is released. Modules using kernel sockets close them in their netns exit() handler. Also add sock_not_owned_by_me() helper to get LOCKDEP support : inet_csk_clear_xmit_timers_sync() must not be called while socket lock is held. It is very possible we can revert in the future commit 3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\") which attempted to solve the issue in rds only. (net/smc/af_smc.c and net/mptcp/subflow.c have similar code) We probably can remove the check_net() tests from tcp_out_of_resources() and __tcp_close() in the future.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35910"
    },
    {
      "cve": "CVE-2024-35925",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "block: prevent division by zero in blk_rq_stat_sum()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35925"
    },
    {
      "cve": "CVE-2024-35944",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "VMCI: Fix memcpy() run-time warning in dg_dispatch_as_host()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-35944"
    },
    {
      "cve": "CVE-2024-36017",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a struct ifla_vf_vlan_info so the size of such attribute needs to be at least of sizeof(struct ifla_vf_vlan_info) which is 14 bytes. The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes) which is less than sizeof(struct ifla_vf_vlan_info) so this validation is not enough and a too small attribute might be cast to a struct ifla_vf_vlan_info, this might result in an out of bands read access when accessing the saved (casted) entry in ivvl.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36017"
    },
    {
      "cve": "CVE-2024-36286",
      "cwe": {
        "id": "CWE-1287",
        "name": "Improper Validation of Specified Type of Input"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nfnetlink_queue: acquire rcu_read_lock() in instance_destroy_rcu().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36286"
    },
    {
      "cve": "CVE-2024-36484",
      "cwe": {
        "id": "CWE-99",
        "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: relax socket state check at accept time.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36484"
    },
    {
      "cve": "CVE-2024-36904",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36904"
    },
    {
      "cve": "CVE-2024-36905",
      "cwe": {
        "id": "CWE-369",
        "name": "Divide By Zero"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36905"
    },
    {
      "cve": "CVE-2024-36934",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bna: ensure the copied buf is NUL terminated Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from userspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t ensure that the string is terminated inside the buffer, this can lead to OOB read when using sscanf. Fix this issue by using memdup_user_nul instead of memdup_user.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-36934"
    },
    {
      "cve": "CVE-2024-37356",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp: Fix shift-out-of-bounds in dctcp_update_alpha().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-37356"
    },
    {
      "cve": "CVE-2024-38596",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix data races in unix_release_sock/unix_stream_sendmsg.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-38596"
    },
    {
      "cve": "CVE-2024-38598",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: md: fix resync softlockup when bitmap size is less than array size.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-38598"
    },
    {
      "cve": "CVE-2024-38612",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix invalid unregister error path The error path of seg6_init() is wrong in case CONFIG_IPV6_SEG6_LWTUNNEL is not defined. In that case if seg6_hmac_init() fails, the genl_unregister_family() isn\u0027t called. This issue exist since commit 46738b1317e1 (\"ipv6: sr: add option to control lwtunnel support\"), and commit 5559cea2d5aa (\"ipv6: sr: fix possible use-after-free and null-ptr-deref\") replaced unregister_pernet_subsys() with genl_unregister_family() in this error path.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-38612"
    },
    {
      "cve": "CVE-2024-38621",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: media: stk1160: fix bounds checking in stk1160_copy_video() The subtract in this condition is reversed. The -\u003elength is the length of the buffer. The -\u003ebytesused is how many bytes we have copied thus far. When the condition is reversed that means the result of the subtraction is always negative but since it\u0027s unsigned then the result is a very high positive value. That means the overflow check is never true. Additionally, the -\u003ebytesused doesn\u0027t actually work for this purpose because we\u0027re not writing to \"buf-\u003emem + buf-\u003ebytesused\". Instead, the math to calculate the destination where we are writing is a bit involved. You calculate the number of full lines already written, multiply by two, skip a line if necessary so that we start on an odd numbered line, and add the offset into the line. To fix this buffer overflow, just take the actual destination where we are writing, if the offset is already out of bounds print an error and return. Otherwise, write up to buf-\u003elength bytes.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-38621"
    },
    {
      "cve": "CVE-2024-38780",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: dma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-38780"
    },
    {
      "cve": "CVE-2024-39292",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: um: Add winch to winch_handlers before registering winch IRQ Registering a winch IRQ is racy, an interrupt may occur before the winch is added to the winch_handlers list. If that happens, register_winch_irq() adds to that list a winch that is scheduled to be (or has already been) freed, causing a panic later in winch_cleanup(). Avoid the race by adding the winch to the winch_handlers list before registering the IRQ, and rolling back if um_request_irq() fails.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-39292"
    },
    {
      "cve": "CVE-2024-39469",
      "cwe": {
        "id": "CWE-1050",
        "name": "Excessive Platform Resource Consumption within a Loop"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors The error handling in nilfs_empty_dir() when a directory folio/page read fails is incorrect, as in the old ext2 implementation, and if the folio/page cannot be read or nilfs_check_folio() fails, it will falsely determine the directory as empty and corrupt the file system. In addition, since nilfs_empty_dir() does not immediately return on a failed folio/page read, but continues to loop, this can cause a long loop with I/O if i_size of the directory\u0027s inode is also corrupted, causing the log writer thread to wait and hang, as reported by syzbot. Fix these issues by making nilfs_empty_dir() immediately return a false value (0) if it fails to get a directory folio/page.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-39469"
    },
    {
      "cve": "CVE-2024-39487",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-39487"
    },
    {
      "cve": "CVE-2024-39489",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix memleak in seg6_hmac_init_algo seg6_hmac_init_algo returns without cleaning up the previous allocations if one fails, so it\u0027s going to leak all that memory and the crypto tfms. Update seg6_hmac_exit to only free the memory when allocated, so we can reuse the code directly.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-39489"
    },
    {
      "cve": "CVE-2024-40901",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-40901"
    },
    {
      "cve": "CVE-2024-40959",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-40959"
    },
    {
      "cve": "CVE-2024-41046",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix double free in detach The number of the currently released descriptor is never incremented which results in the same skb being released multiple times.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-41046"
    },
    {
      "cve": "CVE-2024-42070",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers register store validation for NFT_DATA_VALUE is conditional, however, the datatype is always either NFT_DATA_VALUE or NFT_DATA_VERDICT. This only requires a new helper function to infer the register type from the set datatype so this conditional check can be removed. Otherwise, pointer to chain object can be leaked through the registers.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-42070"
    },
    {
      "cve": "CVE-2024-42096",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: x86: stop playing stack games in profile_pc().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-42096"
    },
    {
      "cve": "CVE-2024-42106",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: inet_diag: Initialize pad field in struct inet_diag_req_v2.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-42106"
    },
    {
      "cve": "CVE-2024-42131",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: mm: avoid overflows in dirty throttling logic The dirty throttling logic is interspersed with assumptions that dirty limits in PAGE_SIZE units fit into 32-bit (so that various multiplications fit into 64-bits). If limits end up being larger, we will hit overflows, possible divisions by 0 etc. Fix these problems by never allowing so large dirty limits as they have dubious practical value anyway. For dirty_bytes / dirty_background_bytes interfaces we can just refuse to set so large limits. For dirty_ratio / dirty_background_ratio it isn\u0027t so simple as the dirty limit is computed from the amount of available memory which can change due to memory hotplug etc. So when converting dirty limits from ratios to numbers of pages, we just don\u0027t allow the result to exceed UINT_MAX. This is root-only triggerable problem which occurs when the operator sets dirty limits to \u003e16 TB.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-42131"
    },
    {
      "cve": "CVE-2024-42154",
      "cwe": {
        "id": "CWE-805",
        "name": "Buffer Access with Incorrect Length Value"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: validate source addr length I don\u0027t see anything checking that TCP_METRICS_ATTR_SADDR_IPV4 is at least 4 bytes long, and the policy doesn\u0027t have an entry for this attribute at all (neither does it for IPv6 but v6 is manually validated).",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-42154"
    },
    {
      "cve": "CVE-2024-43871",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: devres: Fix memory leakage caused by driver API devm_free_percpu() It will cause memory leakage when use driver API devm_free_percpu() to free memory allocated by devm_alloc_percpu(), fixed by using devres_release() instead of devres_destroy() within devm_free_percpu().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-43871"
    },
    {
      "cve": "CVE-2024-44944",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: ctnetlink: use helper function to calculate expect ID Delete expectation path is missing a call to the nf_expect_get_id() helper function to calculate the expectation ID, otherwise LSB of the expectation object address is leaked to userspace.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-44944"
    },
    {
      "cve": "CVE-2024-44965",
      "cwe": {
        "id": "CWE-229",
        "name": "Improper Handling of Values"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix pti_clone_pgtable() alignment assumption Guenter reported dodgy crashes on an i386-nosmp build using GCC-11 that had the form of endless traps until entry stack exhaust and then #DF from the stack guard. It turned out that pti_clone_pgtable() had alignment assumptions on the start address, notably it hard assumes start is PMD aligned. This is true on x86_64, but very much not true on i386. These assumptions can cause the end condition to malfunction, leading to a \u0027short\u0027 clone. Guess what happens when the user mapping has a short copy of the entry text? Use the correct increment form for addr to avoid alignment assumptions.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-44965"
    },
    {
      "cve": "CVE-2024-46743",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: of/irq: Prevent device address out-of-bounds read in interrupt map walk.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-46743"
    },
    {
      "cve": "CVE-2024-46745",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: Input: uinput - reject requests with unreasonable number of slots When exercising uinput interface syzkaller may try setting up device with a really large number of slots, which causes memory allocation failure in input_mt_init_slots(). While this allocation failure is handled properly and request is rejected, it results in syzkaller reports. Additionally, such request may put undue burden on the system which will try to free a lot of memory for a bogus request. Fix it by limiting allowed number of slots to 100. This can easily be extended if we see devices that can track more than 100 contacts.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-46745"
    },
    {
      "cve": "CVE-2024-46750",
      "cwe": {
        "id": "CWE-413",
        "name": "Improper Resource Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: PCI: Add missing bridge lock to pci_bus_lock().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-46750"
    },
    {
      "cve": "CVE-2024-47684",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\r\n\r\ntcp: check skb is non-NULL in tcp_rto_delta_us()\r\n\r\nWe have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic\r\nkernel that are running ceph and recently hit a null ptr dereference in\r\ntcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also\r\nsaw it getting hit from the RACK case as well. Here are examples of the oops\r\nmessages we saw in each of those cases:\r\n\r\nJul 26 15:05:02 rx [11061395.780353] BUG: kernel NULL pointer dereference, address: 0000000000000020\r\nJul 26 15:05:02 rx [11061395.787572] #PF: supervisor read access in kernel mode\r\nJul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present page\r\nJul 26 15:05:02 rx [11061395.798362] PGD 0 P4D 0\r\nJul 26 15:05:02 rx [11061395.801164] Oops: 0000 [#1] SMP NOPTI\r\nJul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-Ubuntu\r\nJul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/09/2023\r\nJul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 \u003c48\u003e 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 48 f7 e3\r\nJul 26 15:05:02 rx [11061395.849665] RSP: 0018:ffffb75d40003e08 EFLAGS: 00010246\r\nJul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX: 20c49ba5e353f7cf RCX: 0000000000000000\r\nJul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI: 000000000000231c RDI: ffff9874ad283a60\r\nJul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08: 0000000000000000 R09: ffff987605e20aa8\r\nJul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11: ffffb75d4460f740 R12: ffff9874ad283900\r\nJul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14: ffff9874ad283980 R15: ffff9874ad283d30\r\nJul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0000000000000000\r\nJul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\r\nJul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3: 0000003e450ba003 CR4: 0000000000760ef0\r\nJul 26 15:05:02 rx [11061395.913822] PKRU: 55555554\r\nJul 26 15:05:02 rx [11061395.916786] Call Trace:\r\nJul 26 15:05:02 rx [11061395.919488]\r\nJul 26 15:05:02 rx [11061395.921765] ? show_regs.cold+0x1a/0x1f\r\nJul 26 15:05:02 rx [11061395.925859] ? __die+0x90/0xd9\r\nJul 26 15:05:02 rx [11061395.929169] ? no_context+0x196/0x380\r\nJul 26 15:05:02 rx [11061395.933088] ? ip6_protocol_deliver_rcu+0x4e0/0x4e0\r\nJul 26 15:05:02 rx [11061395.938216] ? ip6_sublist_rcv_finish+0x3d/0x50\r\nJul 26 15:05:02 rx [11061395.943000] ? __bad_area_nosemaphore+0x50/0x1a0\r\nJul 26 15:05:02 rx [11061395.947873] ? bad_area_nosemaphore+0x16/0x20\r\nJul 26 15:05:02 rx [11061395.952486] ? do_user_addr_fault+0x267/0x450\r\nJul 26 15:05:02 rx [11061395.957104] ? ipv6_list_rcv+0x112/0x140\r\nJul 26 15:05:02 rx [11061395.961279] ? __do_page_fault+0x58/0x90\r\nJul 26 15:05:02 rx [11061395.965458] ? do_page_fault+0x2c/0xe0\r\nJul 26 15:05:02 rx [11061395.969465] ? page_fault+0x34/0x40\r\nJul 26 15:05:02 rx [11061395.973217] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.977313] ? tcp_rearm_rto+0xe4/0x160\r\nJul 26 15:05:02 rx [11061395.981408] tcp_send_loss_probe+0x10b/0x220\r\nJul 26 15:05:02 rx [11061395.985937] tcp_write_timer_handler+0x1b4/0x240\r\nJul 26 15:05:02 rx [11061395.990809] tcp_write_timer+0x9e/0xe0\r\nJul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240\r\nJul 26 15:05:02 rx [11061395.999866] call_timer_fn+0x32/0x130\r\nJul 26 15:05:02 rx [11061396.003782] __run_timers.part.0+0x180/0x280\r\nJul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10\r\nJul 26 15:05:02 rx [11061396.012841] ? native_x2apic_icr_write+0x30/0x30\r\nJul 26 15:05:02 rx [11061396.017718] ? lapic_next_even\r\n---truncated---",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-47684"
    },
    {
      "cve": "CVE-2024-47701",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: avoid OOB when system.data xattr changes underneath the filesystem.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-47701"
    },
    {
      "cve": "CVE-2024-47707",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ipv6: A NULL dereference vulnerability may occur in rt6_uncached_list_flush_dev() due to the necessary check being removed by a previous commit.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-47707"
    },
    {
      "cve": "CVE-2024-47737",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: nfsd: call cache_put if xdr_reserve_space returns NULL.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-47737"
    },
    {
      "cve": "CVE-2024-48881",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-48881"
    },
    {
      "cve": "CVE-2024-49881",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: update orig_path in ext4_find_extent().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49881"
    },
    {
      "cve": "CVE-2024-49884",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix slab-use-after-free in ext4_split_extent_at().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49884"
    },
    {
      "cve": "CVE-2024-49948",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: add more sanity checks to qdisc_pkt_len_init().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49948"
    },
    {
      "cve": "CVE-2024-49949",
      "cwe": {
        "id": "CWE-124",
        "name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: avoid potential underflow in qdisc_pkt_len_init() with UFO.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49949"
    },
    {
      "cve": "CVE-2024-49952",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: prevent nf_skb_duplicated corruption.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49952"
    },
    {
      "cve": "CVE-2024-49982",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in more places For fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put() instead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs into use-after-free. Then Nicolai Stange found more places in aoe have potential use-after-free problem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe() and aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push packet to tx queue. So they should also use dev_hold() to increase the refcnt of skb-\u003edev. On the other hand, moving dev_put() to tx() causes that the refcnt of skb-\u003edev be reduced to a negative value, because corresponding dev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(), probe(), and aoecmd_cfg_rsp(). This patch fixed this issue.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49982"
    },
    {
      "cve": "CVE-2024-49997",
      "cwe": {
        "id": "CWE-226",
        "name": "Sensitive Information in Resource Not Removed Before Reuse"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: ethernet: lantiq_etop: fix memory disclosure When applying padding, the buffer is not zeroed, which results in memory disclosure. The mentioned data is observed on the wire. This patch uses skb_put_padto() to pad Ethernet frames properly. The mentioned function zeroes the expanded buffer. In case the packet cannot be padded it is silently dropped. Statistics are also not incremented. This driver does not support statistics in the old 32-bit format or the new 64-bit format. These will be added in the future. In its current form, the patch should be easily backported to stable versions. Ethernet MACs on Amazon-SE and Danube cannot do padding of the packets in hardware, so software padding must be applied.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-49997"
    },
    {
      "cve": "CVE-2024-50006",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ext4: fix i_data_sem unlock order in ext4_ind_migrate().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50006"
    },
    {
      "cve": "CVE-2024-50040",
      "cwe": {
        "id": "CWE-390",
        "name": "Detection of Error Condition Without Action"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: igb: Do not bring the device up after non-fatal error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50040"
    },
    {
      "cve": "CVE-2024-50045",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50045"
    },
    {
      "cve": "CVE-2024-50251",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_payload: sanitize offset and length before calling skb_checksum() If access to offset + length is larger than the skbuff length, then skb_checksum() triggers BUG_ON(). skb_checksum() internally subtracts the length parameter while iterating over skbuff, BUG_ON(len) at the end of it checks that the expected length to be included in the checksum calculation is fully consumed.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50251"
    },
    {
      "cve": "CVE-2024-50262",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: bpf: Fix out-of-bounds write in trie_get_next_key().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50262"
    },
    {
      "cve": "CVE-2024-50299",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sctp: properly validate chunk size in sctp_sf_ootb()",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50299"
    },
    {
      "cve": "CVE-2024-50301",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: security/keys: fix slab-out-of-bounds in key_task_permission.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50301"
    },
    {
      "cve": "CVE-2024-50602",
      "cwe": {
        "id": "CWE-754",
        "name": "Improper Check for Unusual or Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-50602"
    },
    {
      "cve": "CVE-2024-52332",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "summary",
          "text": "igb: Fix potential invalid memory access in igb_init_module() The pci_register_driver() can fail and when this happened, the dca_notifier needs to be unregistered, otherwise the dca_notifier can be called when igb fails to install, resulting to invalid memory access.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-52332"
    },
    {
      "cve": "CVE-2024-52533",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "summary",
          "text": "gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing \u0027\\\\0\u0027 character.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-52533"
    },
    {
      "cve": "CVE-2024-53057",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53057"
    },
    {
      "cve": "CVE-2024-53124",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: fix data-races around sk sk_forward_alloc.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53124"
    },
    {
      "cve": "CVE-2024-53140",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netlink: terminate outstanding dump on socket close Netlink supports iterative dumping of data. It provides the families the following ops: - start - (optional) kicks off the dumping process - dump - actual dump helper, keeps getting called until it returns 0 - done - (optional) pairs with .start, can be used for cleanup The whole process is asynchronous and the repeated calls to .dump don\u0027t actually happen in a tight loop, but rather are triggered in response to recvmsg() on the socket. This gives the user full control over the dump, but also means that the user can close the socket without getting to the end of the dump. To make sure .start is always paired with .done we check if there is an ongoing dump before freeing the socket, and if so call .done. The complication is that sockets can get freed from BH and .done is allowed to sleep. So we use a workqueue to defer the call, when needed. Unfortunately this does not work correctly. What we defer is not the cleanup but rather releasing a reference on the socket. We have no guarantee that we own the last reference, if someone else holds the socket they may release it in BH and we\u0027re back to square one. The whole dance, however, appears to be unnecessary. Only the user can interact with dumps, so we can clean up when socket is closed. And close always happens in process context. Some async code may still access the socket after close, queue notification skbs to it etc. but no dumps can start, end or otherwise make progress. Delete the workqueue and flush the dump state directly from the release handler. Note that further cleanup is possible in -next, for instance we now always call .done before releasing the main module reference, so dump doesn\u0027t have to take a reference of its own.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53140"
    },
    {
      "cve": "CVE-2024-53164",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: sched: fix ordering of qlen adjustment Changes to sch-\u003eq.qlen around qdisc_tree_reduce_backlog() need to happen _before_ a call to said function because otherwise it may fail to notify parent qdiscs when the child is about to become empty.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53164"
    },
    {
      "cve": "CVE-2024-53165",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: sh: intc: Fix use-after-free bug in register_intc_controller() In the error handling for this function, d is freed without ever removing it from intc_list which would lead to a use after free. To fix this, let\u0027s only add it to the list after everything has succeeded.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53165"
    },
    {
      "cve": "CVE-2024-53217",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: NFSD: Prevent NULL dereference in nfsd4_process_cb_update().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-53217"
    },
    {
      "cve": "CVE-2024-56433",
      "cwe": {
        "id": "CWE-1188",
        "name": "Initialization of a Resource with an Insecure Default"
      },
      "notes": [
        {
          "category": "summary",
          "text": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56433"
    },
    {
      "cve": "CVE-2024-56569",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "summary",
          "text": "ftrace: Fix regression with module command in stack_trace_filter When executing the following command: # echo \"write*:mod:ext3\" \u003e /sys/kernel/tracing/stack_trace_filter The current mod command causes a null pointer dereference. While commit 0f17976568b3f (\"ftrace: Fix regression with module command in stack_trace_filter\") has addressed part of the issue, it left a corner case unhandled, which still results in a kernel crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56569"
    },
    {
      "cve": "CVE-2024-56570",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: ovl: Filter invalid inodes with missing lookup function Add a check to the ovl_dentry_weird() function to prevent the processing of directory inodes that lack the lookup function.This is important because such inodes can cause errors in overlayfs when passed to the lowerstack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56570"
    },
    {
      "cve": "CVE-2024-56600",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net: inet6: do not leave a dangling sk pointer in inet6_create() sock_init_data() attaches the allocated sk pointer to the provided sock object. If inet6_create() fails later, the sk object is released, but the sock object retains the dangling sk pointer, which may cause use-after-free later. Clear the sock sk pointer on error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56600"
    },
    {
      "cve": "CVE-2024-56601",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net: inet: do not leave a dangling sk pointer in inet_create() sock_init_data() attaches the allocated sk object to the provided sock object. If inet_create() fails later, the sk object is freed, but the sock object retains the dangling pointer, which may create use-after-free later. Clear the sk pointer in the sock object on error.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56601"
    },
    {
      "cve": "CVE-2024-56606",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "summary",
          "text": "af_packet: avoid erroring out after sock_init_data() in packet_create() After sock_init_data() the allocated sk object is attached to the provided sock object. On error, packet_create() frees the sk object leaving the dangling pointer in the sock object on return. Some other code may try to use this pointer and cause use-after-free.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56606"
    },
    {
      "cve": "CVE-2024-56644",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: net/ipv6: release expired exception dst cached in socket Dst objects get leaked in ip6_negative_advice() when this function is executed for an expired IPv6 route located in the exception table.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56644"
    },
    {
      "cve": "CVE-2024-56650",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: fix LED ID check in led_tg_check() Syzbot has reported the following BUG detected by KASAN",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56650"
    },
    {
      "cve": "CVE-2024-56770",
      "cwe": {
        "id": "CWE-670",
        "name": "Always-Incorrect Control Flow Implementation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "net/sched: netem: The interface fully stops transferring packets and \"locks\". In this case, the child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at its limit and no more packets are accepted.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2024-56779",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur\r\n\r\nThe action force umount(umount -f) will attempt to kill all rpc_task even\r\numount operation may ultimately fail if some files remain open.\r\nConsequently, if an action attempts to open a file, it can potentially\r\nsend two rpc_task to nfs server.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56779"
    },
    {
      "cve": "CVE-2024-56780",
      "cwe": {
        "id": "CWE-833",
        "name": "Deadlock"
      },
      "notes": [
        {
          "category": "summary",
          "text": "quota: flush quota_release_work upon quota writeback One of the paths quota writeback is called from is: freeze_super() sync_filesystem() ext4_sync_fs() dquot_writeback_dquots().",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-56780"
    },
    {
      "cve": "CVE-2024-57884",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "summary",
          "text": "mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()\r\n\r\nThe task sometimes continues looping in throttle_direct_reclaim() because\r\nallow_direct_reclaim(pgdat) keeps returning false.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57884"
    },
    {
      "cve": "CVE-2024-57901",
      "cwe": {
        "id": "CWE-664",
        "name": "Improper Control of a Resource Through its Lifetime"
      },
      "notes": [
        {
          "category": "summary",
          "text": "af_packet: vlan_get_protocol_dgram() vs MSG_PEEK Blamed allowing a crash.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2024-57901"
    },
    {
      "cve": "CVE-2025-0167",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When asked to use a .netrc file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a default entry that omits both login and password. A rare circumstance.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-0167"
    },
    {
      "cve": "CVE-2025-0395",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-0395"
    },
    {
      "cve": "CVE-2025-0665",
      "cwe": {
        "id": "CWE-1341",
        "name": "Multiple Releases of Same Resource or Handle"
      },
      "notes": [
        {
          "category": "summary",
          "text": "libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-0665"
    },
    {
      "cve": "CVE-2025-0725",
      "cwe": {
        "id": "CWE-680",
        "name": "Integer Overflow to Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-0725"
    },
    {
      "cve": "CVE-2025-1390",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "summary",
          "text": "The PAM module pam_cap.so of libcap configuration supports group names starting with \u201c@\u201d, during actual parsing, configurations not starting with \u201c@\u201d are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-1390"
    },
    {
      "cve": "CVE-2025-3277",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "summary",
          "text": "An integer overflow can be triggered in SQLite\u0027s \u0027concat_ws()\u0027 function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size 4GB can be triggered. This can result in arbitrary code execution.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-3277"
    },
    {
      "cve": "CVE-2025-3360",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "1. Describe what is the vulnerability about, e.g.:\n    Affected devices do not properly validate input in the hack-me endpoint of the web service.\n\n    2. Describe what an attacker could do with it - e.g.:\n    This could allow an unauthenticated remote attacker to execute arbitrary code on the device.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0.0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-3360"
    },
    {
      "cve": "CVE-2025-21694",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "summary",
          "text": "fs/proc: softlockup in __read_vmcore",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-21694"
    },
    {
      "cve": "CVE-2025-26466",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A flaw was found in the OpenSSH package. For each ping packet the SSH server receives, a pong packet is allocated in a memory buffer and stored in a queue of packages. It is only freed when the server/client key exchange has finished. A malicious client may keep sending such packages, leading to an uncontrolled increase in memory consumption on the server side. Consequently, the server may become unavailable, resulting in a denial of service attack.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-26466"
    },
    {
      "cve": "CVE-2025-29087",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In SQLite, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-29087"
    },
    {
      "cve": "CVE-2025-29088",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "summary",
          "text": "A vulnerability in sqlite allows an attacker to cause a denial of service via the SQLITE_DBCONFIG_LOOKASIDE component.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-29088"
    },
    {
      "cve": "CVE-2025-32728",
      "cwe": {
        "id": "CWE-440",
        "name": "Expected Behavior Violation"
      },
      "notes": [
        {
          "category": "summary",
          "text": "In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.",
          "title": "Summary"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-0001",
          "CSAFPID-0002",
          "CSAFPID-0003",
          "CSAFPID-0004",
          "CSAFPID-0005"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Only build and run applications from trusted sources.",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update to V3.1.5 or later version",
          "product_ids": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ],
          "url": "https://support.industry.siemens.com/cs/ww/en/view/109478459/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-0001",
            "CSAFPID-0002",
            "CSAFPID-0003",
            "CSAFPID-0004",
            "CSAFPID-0005"
          ]
        }
      ],
      "title": "CVE-2025-32728"
    }
  ]
}
  msrc_cve-2024-11053
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-11053 netrc and redirect credential leak - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-11053.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "netrc and redirect credential leak",
    "tracking": {
      "current_release_date": "2025-04-12T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T02:41:15.709Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-11053",
      "initial_release_date": "2024-12-02T00:00:00.000Z",
      "revision_history": [
        {
          "date": "2025-01-17T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2025-02-17T00:00:00.000Z",
          "legacy_version": "2",
          "number": "2",
          "summary": "Information published."
        },
        {
          "date": "2025-03-13T00:00:00.000Z",
          "legacy_version": "3",
          "number": "3",
          "summary": "Information published."
        },
        {
          "date": "2025-03-27T00:00:00.000Z",
          "legacy_version": "4",
          "number": "4",
          "summary": "Information published."
        },
        {
          "date": "2025-04-12T00:00:00.000Z",
          "legacy_version": "5",
          "number": "5",
          "summary": "Information published."
        }
      ],
      "status": "final",
      "version": "5"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              },
              {
                "category": "product_version",
                "name": "3.0",
                "product": {
                  "name": "Azure Linux 3.0",
                  "product_id": "17084"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 mysql 8.0.41-1",
                "product": {
                  "name": "\u003ccbl2 mysql 8.0.41-1",
                  "product_id": "18"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 mysql 8.0.41-1",
                "product": {
                  "name": "cbl2 mysql 8.0.41-1",
                  "product_id": "17153"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 mysql 8.0.41-1",
                "product": {
                  "name": "\u003cazl3 mysql 8.0.41-1",
                  "product_id": "14"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 mysql 8.0.41-1",
                "product": {
                  "name": "azl3 mysql 8.0.41-1",
                  "product_id": "17539"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 mysql 8.0.40-6",
                "product": {
                  "name": "\u003cazl3 mysql 8.0.40-6",
                  "product_id": "8"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 mysql 8.0.40-6",
                "product": {
                  "name": "azl3 mysql 8.0.40-6",
                  "product_id": "19257"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 mysql 8.0.40-4",
                "product": {
                  "name": "\u003ccbl2 mysql 8.0.40-4",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 mysql 8.0.40-4",
                "product": {
                  "name": "cbl2 mysql 8.0.40-4",
                  "product_id": "19825"
                }
              }
            ],
            "category": "product_name",
            "name": "mysql"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 cmake 3.21.4-15",
                "product": {
                  "name": "\u003ccbl2 cmake 3.21.4-15",
                  "product_id": "17"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 cmake 3.21.4-15",
                "product": {
                  "name": "cbl2 cmake 3.21.4-15",
                  "product_id": "17154"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 cmake 3.30.3-3",
                "product": {
                  "name": "\u003cazl3 cmake 3.30.3-3",
                  "product_id": "13"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 cmake 3.30.3-3",
                "product": {
                  "name": "azl3 cmake 3.30.3-3",
                  "product_id": "17540"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 cmake 3.21.4-17",
                "product": {
                  "name": "\u003ccbl2 cmake 3.21.4-17",
                  "product_id": "3"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 cmake 3.21.4-17",
                "product": {
                  "name": "cbl2 cmake 3.21.4-17",
                  "product_id": "19756"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 cmake 3.30.3-6",
                "product": {
                  "name": "\u003cazl3 cmake 3.30.3-6",
                  "product_id": "15"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 cmake 3.30.3-6",
                "product": {
                  "name": "azl3 cmake 3.30.3-6",
                  "product_id": "17464"
                }
              }
            ],
            "category": "product_name",
            "name": "cmake"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 curl 8.8.0-4",
                "product": {
                  "name": "\u003ccbl2 curl 8.8.0-4",
                  "product_id": "16"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 curl 8.8.0-4",
                "product": {
                  "name": "cbl2 curl 8.8.0-4",
                  "product_id": "17155"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 curl 8.11.1-1",
                "product": {
                  "name": "\u003cazl3 curl 8.11.1-1",
                  "product_id": "11"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 curl 8.11.1-1",
                "product": {
                  "name": "azl3 curl 8.11.1-1",
                  "product_id": "17542"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cazl3 curl 8.8.0-4",
                "product": {
                  "name": "\u003cazl3 curl 8.8.0-4",
                  "product_id": "10"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 curl 8.8.0-4",
                "product": {
                  "name": "azl3 curl 8.8.0-4",
                  "product_id": "17579"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 curl 8.8.0-6",
                "product": {
                  "name": "\u003ccbl2 curl 8.8.0-6",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 curl 8.8.0-6",
                "product": {
                  "name": "cbl2 curl 8.8.0-6",
                  "product_id": "19799"
                }
              }
            ],
            "category": "product_name",
            "name": "curl"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cazl3 tensorflow 2.16.1-7",
                "product": {
                  "name": "\u003cazl3 tensorflow 2.16.1-7",
                  "product_id": "12"
                }
              },
              {
                "category": "product_version",
                "name": "azl3 tensorflow 2.16.1-7",
                "product": {
                  "name": "azl3 tensorflow 2.16.1-7",
                  "product_id": "17541"
                }
              }
            ],
            "category": "product_name",
            "name": "tensorflow"
          },
          {
            "category": "product_name",
            "name": "azl3 rust 1.75.0-14",
            "product": {
              "name": "azl3 rust 1.75.0-14",
              "product_id": "6"
            }
          },
          {
            "category": "product_name",
            "name": "cbl2 tensorflow 2.11.1-2",
            "product": {
              "name": "cbl2 tensorflow 2.11.1-2",
              "product_id": "7"
            }
          },
          {
            "category": "product_name",
            "name": "cbl2 rust 1.72.0-10",
            "product": {
              "name": "cbl2 rust 1.72.0-10",
              "product_id": "4"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 tensorflow 2.16.1-9",
            "product": {
              "name": "azl3 tensorflow 2.16.1-9",
              "product_id": "9"
            }
          },
          {
            "category": "product_name",
            "name": "azl3 rust 1.86.0-1",
            "product": {
              "name": "azl3 rust 1.86.0-1",
              "product_id": "5"
            }
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 mysql 8.0.41-1 as a component of CBL Mariner 2.0",
          "product_id": "17086-18"
        },
        "product_reference": "18",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 mysql 8.0.41-1 as a component of CBL Mariner 2.0",
          "product_id": "17153-17086"
        },
        "product_reference": "17153",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 cmake 3.21.4-15 as a component of CBL Mariner 2.0",
          "product_id": "17086-17"
        },
        "product_reference": "17",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 cmake 3.21.4-15 as a component of CBL Mariner 2.0",
          "product_id": "17154-17086"
        },
        "product_reference": "17154",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 curl 8.8.0-4 as a component of CBL Mariner 2.0",
          "product_id": "17086-16"
        },
        "product_reference": "16",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 curl 8.8.0-4 as a component of CBL Mariner 2.0",
          "product_id": "17155-17086"
        },
        "product_reference": "17155",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 mysql 8.0.41-1 as a component of Azure Linux 3.0",
          "product_id": "17084-14"
        },
        "product_reference": "14",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 mysql 8.0.41-1 as a component of Azure Linux 3.0",
          "product_id": "17539-17084"
        },
        "product_reference": "17539",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 cmake 3.30.3-3 as a component of Azure Linux 3.0",
          "product_id": "17084-13"
        },
        "product_reference": "13",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 cmake 3.30.3-3 as a component of Azure Linux 3.0",
          "product_id": "17540-17084"
        },
        "product_reference": "17540",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 tensorflow 2.16.1-7 as a component of Azure Linux 3.0",
          "product_id": "17084-12"
        },
        "product_reference": "12",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 tensorflow 2.16.1-7 as a component of Azure Linux 3.0",
          "product_id": "17541-17084"
        },
        "product_reference": "17541",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 curl 8.11.1-1 as a component of Azure Linux 3.0",
          "product_id": "17084-11"
        },
        "product_reference": "11",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 curl 8.11.1-1 as a component of Azure Linux 3.0",
          "product_id": "17542-17084"
        },
        "product_reference": "17542",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 curl 8.8.0-4 as a component of Azure Linux 3.0",
          "product_id": "17084-10"
        },
        "product_reference": "10",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 curl 8.8.0-4 as a component of Azure Linux 3.0",
          "product_id": "17579-17084"
        },
        "product_reference": "17579",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 curl 8.8.0-6 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 curl 8.8.0-6 as a component of CBL Mariner 2.0",
          "product_id": "19799-17086"
        },
        "product_reference": "19799",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 rust 1.75.0-14 as a component of Azure Linux 3.0",
          "product_id": "17084-6"
        },
        "product_reference": "6",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 cmake 3.21.4-17 as a component of CBL Mariner 2.0",
          "product_id": "17086-3"
        },
        "product_reference": "3",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 cmake 3.21.4-17 as a component of CBL Mariner 2.0",
          "product_id": "19756-17086"
        },
        "product_reference": "19756",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 cmake 3.30.3-6 as a component of Azure Linux 3.0",
          "product_id": "17084-15"
        },
        "product_reference": "15",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 cmake 3.30.3-6 as a component of Azure Linux 3.0",
          "product_id": "17464-17084"
        },
        "product_reference": "17464",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003cazl3 mysql 8.0.40-6 as a component of Azure Linux 3.0",
          "product_id": "17084-8"
        },
        "product_reference": "8",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 mysql 8.0.40-6 as a component of Azure Linux 3.0",
          "product_id": "19257-17084"
        },
        "product_reference": "19257",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
          "product_id": "17086-7"
        },
        "product_reference": "7",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 rust 1.72.0-10 as a component of CBL Mariner 2.0",
          "product_id": "17086-4"
        },
        "product_reference": "4",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
          "product_id": "17084-9"
        },
        "product_reference": "9",
        "relates_to_product_reference": "17084"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 mysql 8.0.40-4 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 mysql 8.0.40-4 as a component of CBL Mariner 2.0",
          "product_id": "19825-17086"
        },
        "product_reference": "19825",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "azl3 rust 1.86.0-1 as a component of Azure Linux 3.0",
          "product_id": "17084-5"
        },
        "product_reference": "5",
        "relates_to_product_reference": "17084"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-11053",
      "flags": [
        {
          "label": "component_not_present",
          "product_ids": [
            "17086-7",
            "17084-9"
          ]
        },
        {
          "label": "vulnerable_code_not_in_execute_path",
          "product_ids": [
            "17084-6",
            "17086-4",
            "17084-5"
          ]
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "curl",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17153-17086",
          "17154-17086",
          "17155-17086",
          "17539-17084",
          "17540-17084",
          "17541-17084",
          "17542-17084",
          "17579-17084",
          "19799-17086",
          "19756-17086",
          "17464-17084",
          "19257-17084",
          "19825-17086"
        ],
        "known_affected": [
          "17086-18",
          "17086-17",
          "17086-16",
          "17084-14",
          "17084-13",
          "17084-12",
          "17084-11",
          "17084-10",
          "17086-2",
          "17086-3",
          "17084-15",
          "17084-8",
          "17086-1"
        ],
        "known_not_affected": [
          "17084-6",
          "17086-7",
          "17086-4",
          "17084-9",
          "17084-5"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-11053 netrc and redirect credential leak - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-11053.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "8.0.41-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-18",
            "17084-14",
            "17084-8",
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "3.21.4-15:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-17",
            "17086-3"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "8.8.0-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-16",
            "17086-2"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "3.30.3-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-13",
            "17084-15"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "2.16.1-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-12"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        },
        {
          "category": "vendor_fix",
          "date": "2025-01-17T00:00:00.000Z",
          "details": "8.11.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17084-11",
            "17084-10"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "environmentalsScore": 0.0,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "temporalScore": 3.4,
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "17086-18",
            "17086-17",
            "17086-16",
            "17084-14",
            "17084-13",
            "17084-12",
            "17084-11",
            "17084-10",
            "17086-2",
            "17086-3",
            "17084-15",
            "17084-8",
            "17086-1"
          ]
        }
      ],
      "title": "netrc and redirect credential leak"
    }
  ]
}
  fkie_cve-2024-11053
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-11053.html | Vendor Advisory | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://curl.se/docs/CVE-2024-11053.json | Vendor Advisory | |
| 2499f714-1537-4658-8207-48ae4bb9eae9 | https://hackerone.com/reports/2829063 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/12/11/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250124-0012/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250131-0003/ | Third Party Advisory | 
| Vendor | Product | Version | |
|---|---|---|---|
| haxx | curl | * | |
| netapp | ontap | 9 | |
| netapp | ontap_select_deploy_administration_utility | - | |
| netapp | h610c_firmware | - | |
| netapp | h610c | - | |
| netapp | h610s_firmware | - | |
| netapp | h610s | - | |
| netapp | h615c_firmware | - | |
| netapp | h615c | - | |
| netapp | h700s_firmware | - | |
| netapp | h700s | - | |
| netapp | bootstrap_os | - | |
| netapp | hci_compute_node | - | |
| netapp | h300s_firmware | - | |
| netapp | h300s | - | |
| netapp | h410s_firmware | - | |
| netapp | h410s | - | |
| netapp | h500s_firmware | - | |
| netapp | h500s | - | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F834FD12-881B-47A6-90B0-A440E61A9CE0",
              "versionEndExcluding": "8.11.1",
              "versionStartIncluding": "7.76.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A20333EE-4C13-426E-8B54-D78679D5DDB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D9B255-C1AF-42D1-BF9B-13642FBDC080",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F63A3FA7-AAED-4A9D-9FDE-6195302DA0F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7296A1F2-D315-4FD5-8A73-65C480C855BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "When asked to both use a `.netrc` file for credentials and to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has an entry that matches\nthe redirect target hostname but the entry either omits just the password or\nomits both login and password."
    },
    {
      "lang": "es",
      "value": "Cuando se le pide que use un archivo `.netrc` para las credenciales y que siga las redirecciones HTTP, curl podr\u00eda filtrar la contrase\u00f1a utilizada para el primer host al host al que sigue en determinadas circunstancias. Esta falla solo se manifiesta si el archivo netrc tiene una entrada que coincide con el nombre de host de destino de la redirecci\u00f3n, pero la entrada omite solo la contrase\u00f1a u omite tanto el nombre de usuario como la contrase\u00f1a."
    }
  ],
  "id": "CVE-2024-11053",
  "lastModified": "2025-07-30T17:39:25.437",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.4,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-11T08:15:05.307",
  "references": [
    {
      "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://curl.se/docs/CVE-2024-11053.html"
    },
    {
      "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://curl.se/docs/CVE-2024-11053.json"
    },
    {
      "source": "2499f714-1537-4658-8207-48ae4bb9eae9",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://hackerone.com/reports/2829063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2024/12/11/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20250124-0012/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20250131-0003/"
    }
  ],
  "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  rhsa-2025:1671
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for mysql is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:1671",
        "url": "https://access.redhat.com/errata/RHSA-2025:1671"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2294581",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
      },
      {
        "category": "external",
        "summary": "2294676",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
      },
      {
        "category": "external",
        "summary": "2301888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
      },
      {
        "category": "external",
        "summary": "2318857",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
      },
      {
        "category": "external",
        "summary": "2318858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
      },
      {
        "category": "external",
        "summary": "2318870",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
      },
      {
        "category": "external",
        "summary": "2318873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
      },
      {
        "category": "external",
        "summary": "2318874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
      },
      {
        "category": "external",
        "summary": "2318876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
      },
      {
        "category": "external",
        "summary": "2318882",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
      },
      {
        "category": "external",
        "summary": "2318883",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
      },
      {
        "category": "external",
        "summary": "2318884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
      },
      {
        "category": "external",
        "summary": "2318885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
      },
      {
        "category": "external",
        "summary": "2318886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
      },
      {
        "category": "external",
        "summary": "2318897",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
      },
      {
        "category": "external",
        "summary": "2318900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
      },
      {
        "category": "external",
        "summary": "2318905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
      },
      {
        "category": "external",
        "summary": "2318914",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
      },
      {
        "category": "external",
        "summary": "2318922",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
      },
      {
        "category": "external",
        "summary": "2318923",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
      },
      {
        "category": "external",
        "summary": "2318925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
      },
      {
        "category": "external",
        "summary": "2318926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
      },
      {
        "category": "external",
        "summary": "2318927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
      },
      {
        "category": "external",
        "summary": "2331191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
      },
      {
        "category": "external",
        "summary": "2339218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
      },
      {
        "category": "external",
        "summary": "2339220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
      },
      {
        "category": "external",
        "summary": "2339221",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
      },
      {
        "category": "external",
        "summary": "2339226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
      },
      {
        "category": "external",
        "summary": "2339231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
      },
      {
        "category": "external",
        "summary": "2339236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
      },
      {
        "category": "external",
        "summary": "2339238",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
      },
      {
        "category": "external",
        "summary": "2339243",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
      },
      {
        "category": "external",
        "summary": "2339247",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
      },
      {
        "category": "external",
        "summary": "2339252",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
      },
      {
        "category": "external",
        "summary": "2339259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
      },
      {
        "category": "external",
        "summary": "2339266",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
      },
      {
        "category": "external",
        "summary": "2339270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
      },
      {
        "category": "external",
        "summary": "2339271",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
      },
      {
        "category": "external",
        "summary": "2339275",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
      },
      {
        "category": "external",
        "summary": "2339277",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
      },
      {
        "category": "external",
        "summary": "2339281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
      },
      {
        "category": "external",
        "summary": "2339284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
      },
      {
        "category": "external",
        "summary": "2339291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
      },
      {
        "category": "external",
        "summary": "2339293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
      },
      {
        "category": "external",
        "summary": "2339295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
      },
      {
        "category": "external",
        "summary": "2339299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
      },
      {
        "category": "external",
        "summary": "2339300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
      },
      {
        "category": "external",
        "summary": "2339304",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
      },
      {
        "category": "external",
        "summary": "2339305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
      },
      {
        "category": "external",
        "summary": "RHEL-40867",
        "url": "https://issues.redhat.com/browse/RHEL-40867"
      },
      {
        "category": "external",
        "summary": "RHEL-5470",
        "url": "https://issues.redhat.com/browse/RHEL-5470"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1671.json"
      }
    ],
    "title": "Red Hat Security Advisory: mysql security update",
    "tracking": {
      "current_release_date": "2025-10-30T06:43:38+00:00",
      "generator": {
        "date": "2025-10-30T06:43:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2025:1671",
      "initial_release_date": "2025-02-19T10:31:41+00:00",
      "revision_history": [
        {
          "date": "2025-02-19T10:31:41+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-02-19T10:31:41+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-30T06:43:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-2.el9_5.src",
                "product": {
                  "name": "mysql-0:8.0.41-2.el9_5.src",
                  "product_id": "mysql-0:8.0.41-2.el9_5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-common-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-common-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-server-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-server-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
                "product": {
                  "name": "mysql-test-0:8.0.41-2.el9_5.aarch64",
                  "product_id": "mysql-test-0:8.0.41-2.el9_5.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
                "product": {
                  "name": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
                  "product_id": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-common-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-common-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-server-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-server-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
                "product": {
                  "name": "mysql-test-0:8.0.41-2.el9_5.x86_64",
                  "product_id": "mysql-test-0:8.0.41-2.el9_5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-common-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-common-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-server-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-server-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-devel-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-devel-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-libs-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-libs-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-2.el9_5.s390x",
                "product": {
                  "name": "mysql-test-0:8.0.41-2.el9_5.s390x",
                  "product_id": "mysql-test-0:8.0.41-2.el9_5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-2.el9_5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.src",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.src",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-common-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-devel-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-libs-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-server-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-test-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2024-06-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2294581"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: SSL_select_next_proto buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "RHBZ#2294581",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-06-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "openssl: SSL_select_next_proto buffer overread"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2024-07-31T04:33:09+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2301888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: libcurl: ASN.1 date parser overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "RHBZ#2301888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "curl: libcurl: ASN.1 date parser overread"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2024-12-09T17:25:06.949000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2331191"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: curl netrc password leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally,  the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n   login alice\n   password alicespassword\n\ndefault\n   login bob\n~~~",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "RHBZ#2331191",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        },
        {
          "category": "workaround",
          "details": "Avoid using the .netrc file together with redirects.",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "curl: curl netrc password leak"
    },
    {
      "cve": "CVE-2024-21193",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318923"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318923",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:35.495000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21194",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318914"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318914",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:35.850000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21196",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318858"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318858",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:36.816000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21197",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318874"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318874",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.130000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21198",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318925"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318925",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.426000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21199",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318922"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318922",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.770000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21201",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318882"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318882",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:38.423000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21203",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:39.267000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21212",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318886"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor).  Supported versions that are affected are 8.0.39 and prior and  8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318886",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:42.238000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21213",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318905"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318905",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:42.559000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21218",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:44.128000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21219",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318897"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318897",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:44.460000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21230",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318900"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318900",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:45.238000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21231",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:45.633000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21236",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318883"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318883",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.226000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21237",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318884"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318884",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.598000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21238",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318857"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318857",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.971000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21239",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318927"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318927",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:48.332000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21241",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318870"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318870",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:48.644000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21247",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318926"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Client accessible data as well as  unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318926",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:50.451000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-37371",
      "discovery_date": "2024-06-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2294676"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: GSS message token handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "RHBZ#2294676",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
          "url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-06-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "krb5: GSS message token handling"
    },
    {
      "cve": "CVE-2025-21490",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339221"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339221",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:52.253000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21491",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:03:32.601275+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339252"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339252",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:52.647000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    },
    {
      "cve": "CVE-2025-21494",
      "discovery_date": "2025-01-21T21:05:18.130554+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339277"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339277",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:53.805000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21497",
      "discovery_date": "2025-01-21T21:01:05.496242+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339218"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339218",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:54.538000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21500",
      "discovery_date": "2025-01-21T21:06:54.583473+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339300"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339300",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:55.678000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21501",
      "discovery_date": "2025-01-21T21:04:52.611944+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339271"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339271",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:56.037000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21503",
      "discovery_date": "2025-01-21T21:06:16.563221+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339291"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339291",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:56.818000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21504",
      "discovery_date": "2025-01-21T21:02:24.819724+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339236"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339236",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21504",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:57.195000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21505",
      "discovery_date": "2025-01-21T21:07:15.257978+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21505",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:57.648000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21518",
      "discovery_date": "2025-01-21T21:06:24.968915+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339293"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339293",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21518",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:03.419000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21519",
      "discovery_date": "2025-01-21T21:05:34.782135+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339281"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339281",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:03.812000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21520",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "discovery_date": "2025-01-21T21:01:15.087444+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server (component: Options). This issue may allow unauthorized read access to a subset of MySQL Server data via a high-privileged attacker with logon to the infrastructure and requires human interaction from another user.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server Options Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21520",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:04.217000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: MySQL Server Options Vulnerability"
    },
    {
      "cve": "CVE-2025-21521",
      "discovery_date": "2025-01-21T21:04:48.403277+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21521",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:04.705000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21522",
      "discovery_date": "2025-01-21T21:05:46.684614+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339284"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Parser unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339284",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21522",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:05.137000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Parser unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21523",
      "discovery_date": "2025-01-21T21:07:11.251899+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339304"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339304",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21523",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:05.511000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21525",
      "discovery_date": "2025-01-21T21:04:02.333411+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DDL unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21525",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:06.259000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DDL unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21529",
      "discovery_date": "2025-01-21T21:01:41.718371+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339226"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339226",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21529",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:07.906000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21531",
      "discovery_date": "2025-01-21T21:02:03.867196+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339231"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339231",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21531",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:08.723000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21534",
      "discovery_date": "2025-01-21T21:05:09.810100+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339275"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339275",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21534",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:09.873000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21536",
      "discovery_date": "2025-01-21T21:04:31.799644+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339266"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339266",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:10.654000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21540",
      "discovery_date": "2025-01-21T21:02:33.051436+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339238"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339238",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21540",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:12.277000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21543",
      "discovery_date": "2025-01-21T21:03:11.756360+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339247"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339247",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:13.601000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21546",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "discovery_date": "2025-01-21T21:06:50.582476+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339299"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server (component: Security: Privileges). This issue can allow unauthorized update, insert, or delete access to MySQL Server data and unauthorized read access to a subset of data via multiple protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privilege Misuse in MySQL Server Security Component",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339299",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21546",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:14.687000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Privilege Misuse in MySQL Server Security Component"
    },
    {
      "cve": "CVE-2025-21555",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:02:53.591790+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339243"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs and unauthorized modification, such as updating, inserting, or deleting accessible data via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339243",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:18.135000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    },
    {
      "cve": "CVE-2025-21559",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:06:33.774888+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339295"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, causing frequent crashes or hangs, and unauthorized modification to including updating, inserting, and deleting accessible data via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
          "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
          "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339295",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21559",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:19.677000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T10:31:41+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1671"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "AppStream-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "AppStream-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.src",
            "CRB-9.5.0.Z.MAIN:mysql-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-common-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-debugsource-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-devel-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-errmsg-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-libs-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-server-debuginfo-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-0:8.0.41-2.el9_5.x86_64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.aarch64",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.ppc64le",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.s390x",
            "CRB-9.5.0.Z.MAIN:mysql-test-debuginfo-0:8.0.41-2.el9_5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    }
  ]
}
  rhsa-2025:1673
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for the mysql:8.0 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.\n\nSecurity Fix(es):\n\n* openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n\n* krb5: GSS message token handling (CVE-2024-37371)\n\n* curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n\n* mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n\n* mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n\n* mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n\n* mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n\n* mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n\n* mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n\n* mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n\n* mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n\n* mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n\n* mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n\n* mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n\n* mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n\n* curl: curl netrc password leak (CVE-2024-11053)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n\n* mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n\n* mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n\n* mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n\n* mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n\n* mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n\n* mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n\n* mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n\n* mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n\n* mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n\n* mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n\n* mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n\n* mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n\n* mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n\n* mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:1673",
        "url": "https://access.redhat.com/errata/RHSA-2025:1673"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2294581",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
      },
      {
        "category": "external",
        "summary": "2294676",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
      },
      {
        "category": "external",
        "summary": "2301888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
      },
      {
        "category": "external",
        "summary": "2318857",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
      },
      {
        "category": "external",
        "summary": "2318858",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
      },
      {
        "category": "external",
        "summary": "2318870",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
      },
      {
        "category": "external",
        "summary": "2318873",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
      },
      {
        "category": "external",
        "summary": "2318874",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
      },
      {
        "category": "external",
        "summary": "2318876",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
      },
      {
        "category": "external",
        "summary": "2318882",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
      },
      {
        "category": "external",
        "summary": "2318883",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
      },
      {
        "category": "external",
        "summary": "2318884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
      },
      {
        "category": "external",
        "summary": "2318885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
      },
      {
        "category": "external",
        "summary": "2318886",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
      },
      {
        "category": "external",
        "summary": "2318897",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
      },
      {
        "category": "external",
        "summary": "2318900",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
      },
      {
        "category": "external",
        "summary": "2318905",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
      },
      {
        "category": "external",
        "summary": "2318914",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
      },
      {
        "category": "external",
        "summary": "2318922",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
      },
      {
        "category": "external",
        "summary": "2318923",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
      },
      {
        "category": "external",
        "summary": "2318925",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
      },
      {
        "category": "external",
        "summary": "2318926",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
      },
      {
        "category": "external",
        "summary": "2318927",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
      },
      {
        "category": "external",
        "summary": "2331191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
      },
      {
        "category": "external",
        "summary": "2339218",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
      },
      {
        "category": "external",
        "summary": "2339220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
      },
      {
        "category": "external",
        "summary": "2339221",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
      },
      {
        "category": "external",
        "summary": "2339226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
      },
      {
        "category": "external",
        "summary": "2339231",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
      },
      {
        "category": "external",
        "summary": "2339236",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
      },
      {
        "category": "external",
        "summary": "2339238",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
      },
      {
        "category": "external",
        "summary": "2339243",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
      },
      {
        "category": "external",
        "summary": "2339247",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
      },
      {
        "category": "external",
        "summary": "2339252",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
      },
      {
        "category": "external",
        "summary": "2339259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
      },
      {
        "category": "external",
        "summary": "2339266",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
      },
      {
        "category": "external",
        "summary": "2339270",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
      },
      {
        "category": "external",
        "summary": "2339271",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
      },
      {
        "category": "external",
        "summary": "2339275",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
      },
      {
        "category": "external",
        "summary": "2339277",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
      },
      {
        "category": "external",
        "summary": "2339281",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
      },
      {
        "category": "external",
        "summary": "2339284",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
      },
      {
        "category": "external",
        "summary": "2339291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
      },
      {
        "category": "external",
        "summary": "2339293",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
      },
      {
        "category": "external",
        "summary": "2339295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
      },
      {
        "category": "external",
        "summary": "2339299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
      },
      {
        "category": "external",
        "summary": "2339300",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
      },
      {
        "category": "external",
        "summary": "2339304",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
      },
      {
        "category": "external",
        "summary": "2339305",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
      },
      {
        "category": "external",
        "summary": "RHEL-40866",
        "url": "https://issues.redhat.com/browse/RHEL-40866"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1673.json"
      }
    ],
    "title": "Red Hat Security Advisory: mysql:8.0 security update",
    "tracking": {
      "current_release_date": "2025-10-30T06:43:38+00:00",
      "generator": {
        "date": "2025-10-30T06:43:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.10"
        }
      },
      "id": "RHSA-2025:1673",
      "initial_release_date": "2025-02-19T11:10:11+00:00",
      "revision_history": [
        {
          "date": "2025-02-19T11:10:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-02-19T11:10:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-30T06:43:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                "product": {
                  "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
                  "product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
                  "product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                "product": {
                  "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0)",
                  "product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=src\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0)",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=aarch64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0)",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=ppc64le\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0)",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=s390x\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debuginfo@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-debugsource@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-devel@0.996-2.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mecab-ipadic-EUCJP@2.7.0.20070801-17.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-common@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-debugsource@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-devel-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-errmsg@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-libs-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-server-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                "product": {
                  "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0)",
                  "product_id": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mysql-test-debuginfo@8.0.41-1.module%2Bel8.10.0%2B22857%2B7f331edd?arch=x86_64\u0026rpmmod=mysql:8.0:8100020250212154709:489197e6"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
        },
        "product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0"
        },
        "product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64 (mysql:8.0) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        },
        "product_reference": "mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-5535",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2024-06-27T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2294581"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in OpenSSL. Affected versions of this package are vulnerable to Information Exposure through the SSL_select_next_proto function. This flaw allows an attacker to cause unexpected application behavior or a crash by exploiting the buffer overread condition when the function is called with a zero-length client list. This issue is only exploitable if the application is misconfigured to use a zero-length server list and mishandles the \u0027no overlap\u0027 response in ALPN or uses the output as the opportunistic protocol in NPN.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "openssl: SSL_select_next_proto buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The FIPS modules in versions 3.3, 3.2, 3.1, and 3.0 are not affected by this issue.\nThe packages shim and shim-unsigned-x64 are not impacted by this CVE, as the affected OpenSSL code path is not utilized.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "RHBZ#2294581",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-5535",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-5535"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-06-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "openssl: SSL_select_next_proto buffer overread"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2024-07-31T04:33:09+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2301888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libcurl, where libcurl\u0027s ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If a syntactically incorrect field is given, the parser can use -1 for the length of the *time fraction*, leading to a `strlen()` performed on a pointer to a heap buffer area that is not purposely NULL terminated.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: libcurl: ASN.1 date parser overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The vulnerability is classified as low severity because it primarily results in a heap buffer over-read rather than a direct memory corruption or code execution risk. Since the ASN.1 parsing occurs after a successful TLS handshake, the malformed certificate must first bypass the TLS library\u0027s validation, which significantly reduces the likelihood of exploitation. \n\nAdditionally, the impact is limited to a potential crash or unintended heap data exposure through CURLINFO_CERTINFO, but not arbitrary code execution. The requirement for a specific TLS backend configuration and the controlled nature of the memory read further minimize its exploitability.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "RHBZ#2301888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-7264",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7264"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-07-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\n\nRed Hat build of curl uses OpenSSL, which is not included in the affected list of GnuTLS, Schannel, Secure Transport and mbedTLS. Inspect which TLS backend is in use by running:\n\n$ curl --version\n\nCheck the reference for curl handled by the maintainers which may contain more relevant information around this vulnerability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "curl: libcurl: ASN.1 date parser overread"
    },
    {
      "cve": "CVE-2024-11053",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2024-12-09T17:25:06.949000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2331191"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in curl. A logic error when processing credentials from the .netrc file while performing redirects allows the transfer of credentials from the original host to the followed-to host under certain circumstances, leaking the credentials to the followed-to host.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "curl: curl netrc password leak",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects curl when a `.netrc` file is used and a redirect is performed. Additionally,  the `.netrc` must match the target hostname but the followed-to host does not have a password or both login and password configured.\n\nExample of a vulnerable .netrc configuration:\n\n~~~\nmachine a.com\n   login alice\n   password alicespassword\n\ndefault\n   login bob\n~~~",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "RHBZ#2331191",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2331191"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-11053",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11053"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-12-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        },
        {
          "category": "workaround",
          "details": "Avoid using the .netrc file together with redirects.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "curl: curl netrc password leak"
    },
    {
      "cve": "CVE-2024-21193",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318923"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: PS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318923",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318923"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21193",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21193"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:35.495000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: PS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21194",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318914"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318914",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318914"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21194",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21194"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:35.850000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21196",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318858"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318858",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318858"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21196",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21196"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:36.816000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: X Plugin unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21197",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318874"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318874",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318874"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21197",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21197"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.130000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Information Schema unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21198",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318925"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DDL unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318925",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318925"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21198",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21198"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.426000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DDL unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21199",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318922"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318922",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318922"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21199",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21199"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:37.770000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21201",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318882"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318882",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318882"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21201",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21201"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:38.423000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21203",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318885"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: FTS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318885",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318885"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21203",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21203"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:39.267000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: FTS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21212",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318886"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Health Monitor).  Supported versions that are affected are 8.0.39 and prior and  8.4.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318886",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318886"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21212",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21212"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:42.238000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Health Monitor unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21213",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318905"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.2 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318905",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318905"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21213",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21213"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:42.559000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21218",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318876"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318876",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318876"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21218",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21218"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:44.128000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21219",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318897"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DML unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318897",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318897"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21219",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21219"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:44.460000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DML unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21230",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318900"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318900",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318900"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21230",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21230"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:45.238000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21231",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318873"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318873",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318873"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:45.633000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Client programs unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21236",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318883"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318883",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318883"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21236",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21236"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.226000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21237",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318884"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication GCS).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318884",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318884"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21237",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21237"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.598000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21238",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318857"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.39 and prior, 8.4.1 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318857",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318857"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21238",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21238"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:47.971000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21239",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318927"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318927",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318927"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21239",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21239"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:48.332000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21241",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318870"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318870",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318870"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21241",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21241"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:48.644000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-21247",
      "discovery_date": "2024-10-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2318926"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Client product of Oracle MySQL (component: Client: mysqldump).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Client accessible data as well as  unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "RHBZ#2318926",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2318926"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21247",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21247"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-10-15T19:52:50.451000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: mysqldump unspecified vulnerability (CPU Oct 2024)"
    },
    {
      "cve": "CVE-2024-37371",
      "discovery_date": "2024-06-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2294676"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "krb5: GSS message token handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue is classified as a moderate severity vulnerability because, while it allows an attacker to modify the plaintext \"Extra Count\" field of a GSS krb5 wrap token, the impact is primarily limited to token truncation at the application layer. This truncation can disrupt services but does not directly lead to a full compromise of confidentiality or integrity. The attack requires that the attacker already has access to a valid token transmission to modify, meaning it cannot be exploited remotely without first obtaining or intercepting a valid token.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "RHBZ#2294676",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294676"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-37371",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-37371"
        },
        {
          "category": "external",
          "summary": "https://web.mit.edu/kerberos/www/krb5-1.21/",
          "url": "https://web.mit.edu/kerberos/www/krb5-1.21/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2024-06-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "krb5: GSS message token handling"
    },
    {
      "cve": "CVE-2025-21490",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339221"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the MySQL Server component: InnoDB. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs, via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339221",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339221"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21490",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21490"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:52.253000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: mariadb: High Privilege Denial of Service Vulnerability in MySQL Server (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21491",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:03:32.601275+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339252"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a hang or frequently repeatable crash, resulting in a complete denial of service via network access through multiple protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339252",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339252"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21491",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21491"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:52.647000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    },
    {
      "cve": "CVE-2025-21494",
      "discovery_date": "2025-01-21T21:05:18.130554+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339277"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339277",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339277"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21494",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21494"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:53.805000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21497",
      "discovery_date": "2025-01-21T21:01:05.496242+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339218"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as  unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339218",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339218"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21497",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21497"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:54.538000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21500",
      "discovery_date": "2025-01-21T21:06:54.583473+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339300"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339300",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339300"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21500",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21500"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:55.678000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21501",
      "discovery_date": "2025-01-21T21:04:52.611944+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339271"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339271",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339271"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21501",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21501"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:56.037000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21503",
      "discovery_date": "2025-01-21T21:06:16.563221+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339291"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339291",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339291"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21503",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21503"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:56.818000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21504",
      "discovery_date": "2025-01-21T21:02:24.819724+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339236"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339236",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339236"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21504",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21504"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:57.195000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21505",
      "discovery_date": "2025-01-21T21:07:15.257978+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339305"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339305",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339305"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21505",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21505"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:52:57.648000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Components Services unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21518",
      "discovery_date": "2025-01-21T21:06:24.968915+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339293"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339293",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339293"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21518",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21518"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:03.419000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21519",
      "discovery_date": "2025-01-21T21:05:34.782135+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339281"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339281",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339281"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21519",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21519"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:03.812000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21520",
      "cwe": {
        "id": "CWE-285",
        "name": "Improper Authorization"
      },
      "discovery_date": "2025-01-21T21:01:15.087444+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server (component: Options). This issue may allow unauthorized read access to a subset of MySQL Server data via a high-privileged attacker with logon to the infrastructure and requires human interaction from another user.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server Options Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21520",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21520"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:04.217000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: MySQL Server Options Vulnerability"
    },
    {
      "cve": "CVE-2025-21521",
      "discovery_date": "2025-01-21T21:04:48.403277+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339270"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 7.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339270"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21521",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21521"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:04.705000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21522",
      "discovery_date": "2025-01-21T21:05:46.684614+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339284"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Parser unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339284",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339284"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21522",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21522"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:05.137000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Parser unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21523",
      "discovery_date": "2025-01-21T21:07:11.251899+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339304"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339304",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339304"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21523",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21523"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:05.511000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21525",
      "discovery_date": "2025-01-21T21:04:02.333411+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: DDL unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21525",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21525"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:06.259000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: DDL unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21529",
      "discovery_date": "2025-01-21T21:01:41.718371+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339226"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339226",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339226"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21529",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21529"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:07.906000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Information Schema unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21531",
      "discovery_date": "2025-01-21T21:02:03.867196+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339231"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339231",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339231"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21531",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21531"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:08.723000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: InnoDB unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21534",
      "discovery_date": "2025-01-21T21:05:09.810100+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339275"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Performance Schema).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339275",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339275"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21534",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21534"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:09.873000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Performance Schema unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21536",
      "discovery_date": "2025-01-21T21:04:31.799644+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339266"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer).  Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and  9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339266",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339266"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21536",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21536"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:10.654000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Optimizer unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21540",
      "discovery_date": "2025-01-21T21:02:33.051436+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339238"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of MySQL Server accessible data as well as  unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339238",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339238"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21540",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21540"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:12.277000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Privileges unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21543",
      "discovery_date": "2025-01-21T21:03:11.756360+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339247"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Packaging).  Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and  9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339247",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339247"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21543",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21543"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:13.601000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: Packaging unspecified vulnerability (CPU Jan 2025)"
    },
    {
      "cve": "CVE-2025-21546",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "discovery_date": "2025-01-21T21:06:50.582476+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339299"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server (component: Security: Privileges). This issue can allow unauthorized update, insert, or delete access to MySQL Server data and unauthorized read access to a subset of data via multiple protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: Privilege Misuse in MySQL Server Security Component",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339299",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339299"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21546",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21546"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:14.687000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "mysql: Privilege Misuse in MySQL Server Security Component"
    },
    {
      "cve": "CVE-2025-21555",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:02:53.591790+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339243"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, which causes frequent crashes or hangs and unauthorized modification, such as updating, inserting, or deleting accessible data via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339243",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339243"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21555",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21555"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:18.135000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    },
    {
      "cve": "CVE-2025-21559",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "discovery_date": "2025-01-21T21:06:33.774888+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2339295"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in MySQL Server, specifically in the InnoDB component. This vulnerability allows a high-privileged attacker to cause a denial of service, causing frequent crashes or hangs, and unauthorized modification to including updating, inserting, and deleting accessible data via multiple network protocols.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
          "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "RHBZ#2339295",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2339295"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-21559",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-21559"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL",
          "url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixMSQL"
        }
      ],
      "release_date": "2025-01-21T20:53:19.677000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-02-19T11:10:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:1673"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debuginfo-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-debugsource-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-devel-0:0.996-2.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mecab-ipadic-EUCJP-0:2.7.0.20070801-17.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.src::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-common-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-debugsource-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-devel-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-errmsg-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-libs-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-server-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.aarch64::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.ppc64le::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.s390x::mysql:8.0",
            "AppStream-8.10.0.Z.MAIN.EUS:mysql-test-debuginfo-0:8.0.41-1.module+el8.10.0+22857+7f331edd.x86_64::mysql:8.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.